Artificial Intelligence in Cybersecurity Nadine Wirkuttis and Hadas Klein
Cybersecurity arguably is the discipline that could benefit most from the introduction of artificial intelligence (AI). Where conventional security systems might be slow and insufficient, artificial intelligence techniques can improve their overall security performance and provide better protection from an increasing number of sophisticated cyber threats. Beside the great opportunities attributed to AI within cybersecurity, its use has justified risks and concerns. To further increase the maturity of cybersecurity, a holistic view of organizations’ cyber environment is required in which AI is combined with human insight, since neither people nor AI alone has proven overall success in this sphere. Thus, socially responsible use of AI techniques will be essential to further mitigate related risks and concerns. Keywords: cybersecurity, artificial intelligence (AI), security intelligence, Integrated Security Approach (ISA), cyber kill chain
Introduction 6LQFH ZKHQ WKH ÂżUVW GHQLDO RI VHUYLFH 'R6 DWWDFN ZDV ODXQFKHG 1 WKH VRSKLVWLFDWLRQ QXPEHU DQG LPSDFW RI F\EHUDWWDFNV KDYH LQFUHDVHG VLJQLÂżFDQWO\ $V F\EHUDWWDFNV KDYH EHFRPH PRUH WDUJHWHG DQG SRZHUIXO VR KDYH F\EHUVHFXULW\ FRXQWHUPHDVXUHV :KLOH WKH ÂżUVW VHFXULW\ WRRO ZDV OLPLWHG WR VSRWWLQJ VLJQDWXUHV RI YLUXVHV DQG SUHYHQWLQJ WKHLU H[HFXWLRQ WRGD\ ZH ÂżQG solutions that are designed to provide holistic protection against a wide range
Nadine Wirkuttis is a PhD candidate at the Okinawa Institute of Science and Technology Graduate University and former research intern in the Cyber Security Program at the Institute for National Security Studies. Hadas Klein is the Cyber Security Program Manager at the Institute for National Security Studies. Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
103
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
104
RI DWWDFN W\SHV DQG D YDULHW\ RI WDUJHW V\VWHPV QHYHUWKHOHVV LW KDV EHFRPH LQFUHDVLQJO\ FKDOOHQJLQJ WR SURWHFW LQIRUPDWLRQ DVVHWV LQ WKH YLUWXDO ZRUOG 7R LPSOHPHQW UHVLOLHQW DQG FRQWLQXRXV SURWHFWLRQ VHFXULW\ V\VWHPV QHHG WR FRQVWDQWO\ DGMXVW WR FKDQJLQJ HQYLURQPHQWV WKUHDWV DQG DFWRUV LQYROYHG LQ WKH F\EHU SOD\ &\EHU UHDOLW\ KRZHYHU DSSHDUV VRPHZKDW GLIIHUHQW 6HFXULW\ DSSURDFKHV DUH UHJXODUO\ WDLORUHG WR NQRZQ DWWDFNV DQG GXH WR D ODFN RI ÀH[LELOLW\ DQG UREXVWQHVV VHFXULW\ V\VWHPV W\SLFDOO\ DUH XQDEOH WR DGDSW DXWRPDWLFDOO\ WR FKDQJHV LQ WKHLU VXUURXQGLQJV (YHQ ZLWK KXPDQ LQWHUDFWLRQ DGDSWLRQ SURFHVVHV DUH OLNHO\ WR EH VORZ DQG LQVXI¿FLHQW 2 'XH WR WKHLU ÀH[LEOH DQG DGDSWDEOH V\VWHP EHKDYLRU DUWL¿FLDO LQWHOOLJHQFH $, WHFKQLTXHV FDQ KHOS RYHUFRPH YDULRXV VKRUWFRPLQJV RI WRGD\¶V F\EHUVHFXULW\ WRROV 3 $OWKRXJK $, KDV DOUHDG\ JUHDWO\ LPSURYHG F\EHUVHFXULW\ 4 WKHUH DUH DOVR VHULRXV FRQFHUQV 6RPH YLHZ $, DV DQ HPHUJLQJ H[LVWHQWLDO ULVN IRU KXPDQLW\ 5 $FFRUGLQJO\ VFLHQWLVWV DQG OHJDO H[SHUWV KDYH H[SUHVVHG DODUP DW WKH LQFUHDVLQJ UROH WKDW DXWRQRPRXV $, HQWLWLHV DUH SOD\LQJ LQ F\EHUVSDFH DQG KDYH UDLVHG FRQFHUQV DERXW WKHLU HWKLFDO MXVWL¿DELOLW\ 7KH SXUSRVH RI WKLV ZRUN LV WR KLJKOLJKW WKH VKRUWFRPLQJV RI WUDGLWLRQDO VHFXULW\ PHDVXUHV DV ZHOO DV WKH SURJUHVV WKDW KDV EHHQ PDGH VR IDU E\ DSSO\LQJ $, WHFKQLTXHV WR F\EHUVHFXULW\ ,Q DGGLWLRQ WKLV ZRUN VXPPDUL]HV WKH ULVNV DQG FRQFHUQV OLQNHG WR WKLV GHYHORSPHQW E\ H[SORULQJ $,¶V VWDWXV TXR DGGUHVVLQJ SUHVHQW FRQFHUQV DQG RXWOLQLQJ GLUHFWLRQV IRU WKH IXWXUH
Challenges of Today’s Cybersecurity $OWKRXJK DZDUHQHVV RI F\EHU WKUHDWV KDV LQFUHDVHG ODUJH DPRXQWV RI PRQH\ KDV EHHQ LQYHVWHG DQG HIIRUWV DUH EHLQJ PDGH WR ¿JKW F\EHUFULPHV WKH DELOLW\ RI RUJDQL]DWLRQV WR VXI¿FLHQWO\ SURWHFW WKHLU RZQ YLUWXDO DVVHWV LV QRW \HW NQRZQ 7 7KH LQYROYHG SDUWLHV LQ F\EHUVSDFH UDQJH IURP VLQJOH LQGLYLGXDOV SULYDWH RUJDQL]DWLRQV QRQ VWDWH DFWRUV WR JRYHUQPHQWDO RUJDQL]DWLRQV DOO DLPLQJ WR SURWHFW WKHLU F\EHU DVVHWV DWWDFN WKRVH RI RWKHUV RU ERWK ,Q DGGLWLRQ WKH VRXUFHV RI F\EHU WKUHDWV DUH PDQLIROG F\EHU WKUHDWV EDVLFDOO\ DULVH IURP SRWHQWLDO PDOLFLRXV DFWV GXH WR ¿QDQFLDO SROLWLFDO RU PLOLWDU\ UHDVRQV +RZHYHU KHWHURJHQHRXV DQG G\QDPLF WKH QDWXUH RI F\EHUVSDFH PLJKW EH FHUWDLQ VLPLODULWLHV RI DWWDFNV DQG WKHLU FRXQWHUPHDVXUHV FDQ EH XVHG WR GHVFULEH DQG DOORZ IRU D KROLVWLF VHFXULW\ IUDPHZRUN 0RVW F\EHUDWWDFNV IROORZ FHUWDLQ DWWDFN SKDVHV WKDW FDQ EH GHVFULEHG DV D F\EHU NLOO FKDLQ 9 7KLV IUDPHZRUN DVVXPHV WKDW HYHU\ DWWDFN VHTXHQFH VWDUWV ZLWK D UHFRQQDLVVDQFH phase, in
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
ZKLFK DQ DWWDFNHU WULHV WR ORFDWH JDSV DQG YXOQHUDELOLWLHV RI D WDUJHW V\VWHP The ZHDSRQL]LQJ SKDVH IROORZV GXULQJ ZKLFK WKH XQFRYHUHG ZHDNQHVVHV DUH XVHG WR GHYHORS WDUJHWHG PDOLFLRXV FRGH 7KLV LV IROORZHG E\ WKH GHOLYHU\ phase when WKH PDOZDUH LV WUDQVIHUUHG WR WKH SRWHQWLDO WDUJHW $IWHU WKH PDOZDUH LV GHOLYHUHG VXFFHVVIXOO\ WKH H[SORLW phase occurs during which WKH PDOZDUH WULJJHUV WKH LQVWDOODWLRQ RI DQ LQWUXGHU¶V FRGH $IWHUZDUGV WKH FRPSURPLVHG KRVW V\VWHP DOORZV WKH HVWDEOLVKPHQW RI D FRPPDQG DQG FRQWURO FKDQQHO VR WKDW WKH DWWDFNHU FDQ LQLWLDWH PDOLFLRXV DFWLRQV &RXQWHUDFWLRQV FDQ EH GHWHUPLQHG GHSHQGLQJ XSRQ ZKHUH D PDOLFLRXV DFWLRQ DSSHDUV LQ WKH F\EHU NLOO FKDLQ The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¿QLQJ UHFRYHU\ SURFHGXUHV WR TXLFNO\ UROOEDFN WKH V\VWHP WR LWV LQLWLDO VWDWH
Figure 1. Cyber kill chain phases encapsulated countermeasures ofinthe integrated security approach Figure 1: Cyber kill chain phasesinencapsulated countermeasures of the
integrated security approach
)LJXUH DERYH GHSLFWV WKH LQWHUFRQQHFWLRQ RI F\EHUDWWDFNV GHVFULEHG E\ WKH F\EHU NLOO FKDLQ ZLWK WKHLU FRXQWHUPHDVXUHV FRYHUHG E\ WKH ,6$ 7KH GLDJUDP GHSLFWV WKH F\EHU NLOO FKDLQ KHUH YLVXDOL]HG DV WKH JUD\ DUURZ LQ WKH FHQWHU HQFDSVXODWHG E\ WKH ,6$ 7KH F\EHU NLOO FKDLQ LQFOXGHV WKH VHYHQ
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
105
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
106
SKDVHV RI D F\EHUDWWDFN ZKHUHDV WKH ,6$ FRQVLVWV RI IRXU FRXQWHUDFWLRQ SKDVHV )RU GHWHFWLQJ DQG EORFNLQJ DWWDFNV DV HDUO\ DV SRVVLEOH DOO DWWDFN SKDVHV RI WKH F\EHU NLOO FKDLQ QHHG WR EH FRQVLGHUHG ZLWKLQ WKH FRPSUHKHQVLYH ,6$ IUDPHZRUN 11 $V VWDWHG DERYH WKH HPSKDVLV LV RQ SUHYHQWLQJ DWWDFN DQG GHWHFWLQJ PDOLFLRXV DFWLYLWLHV GXULQJ WKH ¿UVW WKUHH SKDVHV RI DQ LQWUXVLRQ KHUH YLVXDOL]HG DV UHFRQ ZHDSRQL]H DQG GHOLYHU RQ WKH OHIW VLGH RI WKH GLDJUDP ZLWKLQ WKH JUD\ DUURZ $IWHU WKH DWWDFN²GHSLFWHG DV H[SORLW LQ WKH FHQWHU RI WKH DUURZ²WKH ,6$ PHDVXUHV GHWHFWLRQ UHDFWLRQ DQG UHVSRQVH QHFHVVDU\ WR LQWHUIHUH ZLWK WKH FRPSURPLVLQJ PDOLFLRXV DFWLYLWLHV 7KH FRPSOH[ DQG G\QDPLF QDWXUH RI F\EHUVSDFH OHDGV WR YDULRXV VWUDWHJLF DQG WHFKQRORJLFDO FKDOOHQJHV WKDW KLQGHU DQG FRPSOLFDWH DQ RUJDQL]DWLRQ¶V DELOLW\ WR SURWHFW LWVHOI VXI¿FLHQWO\ LQ WKLV YLUWXDO HQYLURQPHQW 7KHVH FKDOOHQJHV FRPSULVH GDWD DFTXLVLWLRQ WHFKQRORJ\ GULYHQ PDWWHUV DV ZHOO DV VKRUWFRPLQJV LQ UHJXODWLRQ DQG SURFHVV PDQDJHPHQW
Challenges in Gathering Cyber Intelligence 7KH IDFW WKDW SHUSHWUDWRUV OHDYH WUDFNV ZKHQ DWWHPSWLQJ WR DWWDFN D SRWHQWLDO WDUJHW V\VWHP LV WKH NH\ WR EHWWHU XQGHUVWDQGLQJ DQ DWWDFNHU &RQVHTXHQWO\ DQ ,6$ ZLWK LWV KROLVWLF YLHZ RI DQ RUJDQL]DWLRQ¶V VHFXULW\ UHTXLUHV JDWKHULQJ DQG DQDO\VLV RI D UDQJH RI LQIRUPDWLRQ IRU JDLQLQJ F\EHU LQWHOOLJHQFH 12 There are challenges, however, in acquiring relevant data as well as in processing, DQDO\]LQJ DQG XVLQJ LW 7KHUHIRUH UHODWHG HIIRUWV WR HIIHFWLYHO\ SUHYHQW GHWHFW DQG UHVSRQG WR PDOLFLRXV LQWUXVLRQV DUH UHJXODUO\ DLGHG E\ VHFXULW\ WRROV WKDW DLP WR DXWRPDWH VXSSRUWLQJ VHFXULW\ SURFHVVHV 7KH PDLQ FKDOOHQJHV LQ DFTXLULQJ UHOHYDQW GDWD WUDFNV are:13 D $PRXQW RI GDWD 7KH DPRXQW RI GDWD KDV LQFUHDVHG H[SRQHQWLDOO\ VLQFH HOHFWURQLF GHYLFHV DQG WKHLU XVH KDV EHFRPH XELTXLWRXV LQ RXU ZRUN DQG GDLO\ OLYHV )RU WKH LPSOHPHQWDWLRQ RI DQ ,6$ GDWD IURP DOO V\VWHPV DFURVV HQWLUH RUJDQL]DWLRQV PD\ QHHG WR EH FRQVLGHUHG E +HWHURJHQHLW\ RI GDWD DQG WKHLU VRXUFHV 7KH YDULDQFH LQ GDWD DQG LWV VRXUFHV PDNHV LW GLI¿FXOW WR LGHQWLI\ DQG FROOHFW WKRVH GDWD PRUHRYHU ERWK DUH VSUHDG DFURVV RUJDQL]DWLRQDO DQG QDWLRQDO ERUGHUV (YHQ LI WKH UHOHYDQW KHWHURJHQHLW\ ZLWKLQ WKH F\EHU HQYLURQPHQW LV LGHQWL¿HG WRSRORJ\ DQG EHKDYLRU RI V\VWHPV DQG QHWZRUNV PD\ FKDQJH DQG WKXV UHTXLUH FRQVWDQW DGDSWLRQ
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
F +LJK GDWD YHORFLW\ The high rate at which data is produced and processed within its sources leads to challenges in data storing and processing, ZKLFK LQ WXUQ LV HVVHQWLDO IRU VXEVHTXHQW DQDO\VLV :KHQ LW FRPHV WR SURFHVVLQJ DQDO\]LQJ DQG XVLQJ WKH DFTXLUHG GDWH LQWUXVLRQ GHWHFWLRQ SUHYHQWLRQ V\VWHPV ,'36 KDYH SURYHG WR EH DQ LQYDOXDEOH WRRO IRU F\EHUVHFXULW\ 14 RQH RI PDQ\ LQ WRGD\¶V F\EHUVHFXULW\ DUVHQDO $Q ,'36 LV HLWKHU VRIWZDUH RU KDUGZDUH FRQ¿JXUHG WR SURWHFW VLQJOH V\VWHPV RU HQWLUH QHWZRUNV 7KHUH DUH WZR PDLQ SULQFLSOHV IRU ,'36V WKH PLVXVH GHWHFWLRQ DSSURDFK ZKLFK LGHQWL¿HV PDOLFLRXV DFWLYLWLHV E\ GH¿QLQJ SDWWHUQV RI DEQRUPDO QHWZRUN DQG RU V\VWHP EHKDYLRU DQG WKH DQRPDO\ GHWHFWLRQ DSSURDFK ZKLFK LV EDVHG RQ GH¿QLQJ SDWWHUQV RI QRUPDO QHWZRUN DQG RU V\VWHP EHKDYLRU 6HFXULW\ H[SHUWV GH¿QH ERWK SDWWHUQV PDLQO\ EDVHG RQ WKHLU H[SHULHQFHV SOXV WKHLU SULRU NQRZOHGJH RI F\EHU WKUHDWV 15 &\EHU UHDOLW\ KRZHYHU LV D KLJKO\ FRPSOH[ DQG G\QDPLF QDWXUH QHZ WKUHDWV DSSHDU FRQVWDQWO\ DQG DWWDFNV DUH VSHFL¿FDOO\ WDLORUHG WR FLUFXPYHQW NQRZQ SURWHFWLRQ VFHQDULRV :KLOH WKH GHVLUHG FKDUDFWHULVWLFV RI ,'36V DUH RSWLPL]HG SHUIRUPDQFH PD[LPXP SURWHFWLRQ DQG PLQLPXP HUURU traditional VHFXULW\ V\VWHPV DUH QR ORQJHU DEOH WR IXOO\ IXO¿OO WKHVH UHTXLUHPHQWV 7KH PRVW FULWLFDO WHFKQRORJLFDO ZHDNQHVVHV are:17 D /RZ GHWHFWLRQ UDWH $Q\ LQDFFXUDF\ LQ GH¿QLQJ SDWWHUQV RI DEQRUPDO RU QRUPDO QHWZRUN DQG RU V\VWHP EHKDYLRU PD\ DIIHFW WKH ,'36¶V GHWHFWLRQ UDWH 7KH FRQWLQXRXVO\ FKDQJLQJ QHWZRUN HQYLURQPHQW PDNHV WKLV WDVN HYHQ PRUH FKDOOHQJLQJ (UURUV LQ GH¿QLQJ DEQRUPDO SDWWHUQV FDQ OHDG WR KLJK IDOVH QHJDWLYH GHWHFWLRQ UDWHV +HUH WKH PDOLFLRXV QHWZRUN DFWLYLWLHV RI DWWHPSWHG DWWDFNV DUH QRW GHWHFWHG LQ DGYDQFH EHFDXVH D QRQ PDOLFLRXV QHWZRUN EHKDYLRU ZDV DVVXPHG LQVWHDG %\ FRQWUDVW HUURQHRXV GH¿QLWLRQ RI QRUPDO SDWWHUQV FDQ FDXVH KLJK IDOVH SRVLWLYH UDWHV FDXVLQJ QRQ PDOLFLRXV QHWZRUN DFWLYLWLHV WR EH FDWHJRUL]HG DV PDOLFLRXV E 6ORZ WKURXJKSXW ,'36V FDQ VKRZ OLPLWDWLRQV LQ SURFHVVLQJ DQG DQDO\]LQJ JLJDELWV RI GDWD SHU VHFRQG 0HFKDQLVPV WKDW DGGUHVV WKLV LVVXH DUH EDVHG PDLQO\ RQ WKH GLVWULEXWLRQ RI GDWD SURFHVVLQJ DQG WKXV FDQ IXUWKHU DIIHFW WKH V\VWHP¶V RSHUDWLRQ PDLQWHQDQFH DQG UHODWHG FRVWV F /DFN RI VFDODELOLW\ DQG UHVLOLHQFH &\EHU HQYLURQPHQWV DUH G\QDPLF ,QIUDVWUXFWXUHV DQG QHWZRUN WUDI¿F FKDQJH DQG H[SDQG FRQVWDQWO\ DQG YDVW DPRXQWV RI KHWHURJHQHRXV GDWD QHHGV WR EH SURFHVVHG DQG DQDO\]HG 7KHVH G\QDPLFV IXUWKHU OHDG WR SHUIRUPDQFH LVVXHV DQG D ORVV RI HI¿FLHQF\
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
107
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
108
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¿FLWV DW VRPH SRLQW WKH\ PD\ XVH VHYHUDO VHFXULW\ V\VWHPV RU SXUFKDVH VHFXULW\ LQWHOOLJHQFH LQ WHUPV RI VHFXULW\ FRQVXOWLQJ WKURXJK WKLUG SDUW\ SURYLGHUV
Additional Challenges %HVLGHV WKH FRPSUHKHQVLYH DFTXLVLWLRQ RI GDWD DQG WKH XVH RI VROLG VHFXULW\ WHFKQRORJLHV IRU SURWHFWLQJ WKH IXOO UDQJH RI LQIRUPDWLRQ LQ D WLPHO\ PDQQHU VXSSRUWLQJ SURFHVVHV DOVR QHHG WR EH FRQVLGHUHG 7KH HVWDEOLVKPHQW DQG PDLQWHQDQFH RI WKHVH SURFHVVHV LV DV LPSRUWDQW DV GDWD DFTXLVLWLRQ DQG WKH XVH RI DSSURSULDWH VHFXULW\ WHFKQRORJLHV ,QWHU RUJDQL]DWLRQDO DV ZHOO DV LQWUD RUJDQL]DWLRQDO SURFHVVHV FDQ KHOS WR IXUWKHU LPSURYH DQG PDLQWDLQ RUJDQL]DWLRQV¶ ,6$V LQ DGGLWLRQ WR LQFUHDVLQJ WKHLU F\EHUVHFXULW\ PDWXULW\ OHYHO 19 )XUWKHUPRUH WKH FUHDWLRQ RI D VR FDOOHG F\EHU HFRV\VWHP20 encourages SDUWQHUVKLSV EHWZHHQ GLYHUVH DFWRUV DFURVV WKH F\EHU ODQGVFDSH WKDW DLP WR DGGUHVV DQG VKDUH VHFXULW\ WKUHDWV H[SHULHQFH RU UHVRXUFHV 2UJDQL]DWLRQV RSHUDWLQJ LQ GLIIHUHQW VHFWRUV DOVR WHQG WR KDYH LQFRQVLVWHQW GHPDQGV RI F\EHUVHFXULW\ 7KHVH GLIIHUHQFHV FDQ FRUUHVSRQG WR KHWHURJHQHRXV VHFXULW\ UHTXLUHPHQWV DV ZHOO DV YDU\LQJ UHVSRQVHV ZKHQ IDFLQJ VLPLODU F\EHUDWWDFNV 21 ,Q FDVHV ZKHUH RUJDQL]DWLRQV QHHG WR SURWHFW FULWLFDO LQIUDVWUXFWXUHV VXFK DV ZDWHU WUHDWPHQW RU QXFOHDU SRZHU SODQWV WKH\ IRFXV RQ LQFUHDVHG VHFXULW\ UDWKHU WKDQ RQ ¿QDQFLDO DVSHFWV ,Q FRPSDULVRQ SULYDWH RUJDQL]DWLRQV WHQG WR IRFXV RQ ¿QDQFLDO ORVVHV DQG GR QRW JLYH WRR PXFK LPSRUWDQFH WR HQGDQJHULQJ SXEOLF VDIHW\ 22 7KHVH DUH RQO\ VRPH RI WKH FKDOOHQJHV WKDW WURXEOH RUJDQL]DWLRQV ZKHQ VHWWLQJ XS WKHLU VHFXULW\ VWUDWHJ\ *LYHQ WKH LPSRUWDQW UROH RI VHFXULW\ V\VWHPV LQ WKLV FRQWH[W WKH IROORZLQJ VHFWLRQ ZLOO IRFXV RQ WKH WHFKQRORJLFDO PHDVXUHV
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
Intelligent Techniques to Facilitate Security Measures ,Q WDFNOLQJ LQWHOOLJHQFH JDWKHULQJ LVVXHV IRU F\EHUVHFXULW\ LQWHOOLJHQW PDFKLQHV VKRZ SURPLVH RI LPSURYLQJ WRGD\¶V VHFXULW\ PHDVXUHV ,QWHOOLJHQW PDFKLQHV FDQ SHUIRUP VRPH KXPDQ FRJQLWLYH DELOLWLHV DELOLW\ WR OHDUQ RU UHDVRQ DV ZHOO DV KDYLQJ VHQVRU\ IXQFWLRQV DELOLW\ WR KHDU RU VHH 7KHVH PDFKLQHV H[KLELW ZKDW ZH FRXOG FDOO LQWHOOLJHQFH 23 6XFK DUWL¿FLDO LQWHOOLJHQFH HQDEOHV PDFKLQHV WR EHKDYH LQWHOOLJHQWO\ DQG LPLWDWH KXPDQ LQWHOOLJHQFH²DOEHLW WR D OLPLWHG H[WHQW 7KH GHYHORSPHQW RI LQWHOOLJHQW V\VWHPV HLWKHU VRIWZDUH RU KDUGZDUH SURYLGHV PHWKRGV WR VROYH FRPSOH[ SUREOHPV²SUREOHPV WKDW FRXOG QRW EH VROYHG ZLWKRXW DSSO\LQJ VRPH LQWHOOLJHQFH 24 :KHUHDV WUDGLWLRQDO FRPSXWHU V\VWHPV DUH EDVHG RQ ¿[HG DOJRULWKPV25 DQG UHTXLUH NQRZQ GDWD IRUPDWV IRU GHFLVLRQ PDNLQJ WKH FRPSXWHU VFLHQFH GLVFLSOLQH RI $, GHYHORSHG ÀH[LEOH WHFKQLTXHV VXFK DV WKH UHFHQWO\ UHYLYHG DSSURDFK RI GHHS QHXUDO QHWZRUNV WKDW HQDEOHV PDFKLQHV WR OHDUQ DQG DGDSW DXWRPDWLFDOO\ WR WKH G\QDPLFV RI WKHLU HQYLURQPHQW ,Q F\EHUVSDFH WKLV PD\ LQFOXGH WKH DXWRPDWLF DGDSWLRQ WR KHWHURJHQHRXV GDWD IRUPDWV FKDQJLQJ GDWD VRXUFHV RU QRLVH27 LQ F\EHU DFWLYLWLHV ,Q WKH UHDOP RI $, F\EHUVHFXULW\ DUJXDEO\ LV WKH LQGXVWU\ WKDW FRXOG EHQH¿W PRVW IURP WKH LQWURGXFWLRQ RI PDFKLQH LQWHOOLJHQFH IXUWKHUPRUH WKH FKDOOHQJHV RI FRQYHQWLRQDO VHFXULW\ V\VWHPV DUH VXSSRVHG WR EH RYHUFRPH E\ XVLQJ DXWRQRPRXV $, V\VWHPV &RQVHTXHQWO\ WKH LVVXHV LQ GDWD DFTXLVLWLRQ DPRXQW KHWHURJHQHLW\ DQG YHORFLW\ RI GDWD DV ZHOO DV WKH SUREOHPV RI WKH UHODWHG WRROV ORZ GHWHFWLRQ UDWH VORZ WKURXJKSXW D ODFN RI VFDODELOLW\ DQG UHVLOLHQFH DQG D ODFN RI DXWRPDWLRQ FRXOG EH PLWLJDWHG WKURXJK $, 7KXV HI¿FLHQF\ DQG WKH HIIHFWLYHQHVV RI F\EHUVHFXULW\ DQG LWV UHVSHFWLYH WRROV FRXOG EH LPSURYHG 7KH ¿HOG RI $, KDV GHYHORSHG DQG LV VWLOO GHYHORSLQJ QXPHURXV WHFKQLTXHV WR DGGUHVV LQWHOOLJHQW V\VWHP EHKDYLRU DQG PDQ\ KDYH EHHQ HVWDEOLVKHG DOUHDG\ LQ WKH ¿HOG RI F\EHUVHFXULW\ 7KHVH V\VWHPV FDQ WKHUHIRUH KDQGOH DQG DQDO\]H YDVW DPRXQWV RI LQIRUPDWLRQ ZLWKLQ D UHDVRQDEOH WLPH IUDPH DQG LQ WKH HYHQW RI DQ DWWHPSWHG DWWDFN FDQ DQDO\]H WKH LQIRUPDWLRQ DQG VHOHFW GHGLFDWHG FRXQWHUDFWLRQV 3RVVLEOH VFHQDULRV ZKHUH $, WHFKQLTXHV DUH DSSOLHG WR VHFXULW\ LVVXHV UHODWHG WR WKH IRXU FDWHJRULHV ZLWKLQ WKH ,6$ FDQ GHPRQVWUDWH WKH YDVW SRVVLELOLWLHV RI WKH YDULRXV EUDQFKHV RI $,
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
109
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
110
Interacting Intelligent Cyber Police Agents to Monitor Entire Networks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
Figure 1. Intelligent Cyber Police AgentsPolice for EarlyAgents Warningsfor in anEarly Integrated Security Approach Figure 2: Intelligent Cyber Warnings in an Integrated
Security Approach
$ SRZHUIXO ZD\ WR XWLOL]H DJHQWV DJDLQVW GLVWULEXWHG F\EHUDWWDFNV LV E\ EXLOGLQJ XS DQ LQWHOOLJHQW DJHQW¶V F\EHU SROLFH 7KLV DSSURDFK SXUVXHV WKH LGHD RI DUWL¿FLDO SROLFH DJHQWV LQ D GH¿QHG F\EHU HQYLURQPHQW WR GHWHFW PDOLFLRXV DFWLYLWLHV LQ D GHFHQWUDOL]HG ZD\ 32 $V YLVXDOL]HG LQ )LJXUH DERYH VXFK SROLFH DJHQWV FDQ IDFLOLWDWH SURWHFWLRQ DOUHDG\ LQ WKH HDUOLHVW VWDJHV RI D F\EHUDWWDFN
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
,QWHOOLJHQW DJHQWV FDQ DOVR EH IRXQG LQ KXPDQ LQVSLUHG DUWL¿FLDO LPPXQH V\VWHPV $,6V %\ XVLQJ WZR GLIIHUHQW W\SHV RI DJHQWV GHWHFWLRQ DQG FRXQWHUDWWDFN DJHQWV WKH EHQH¿FLDO FKDUDFWHULVWLFV RI WKH KXPDQ LPPXQH V\VWHP LV LPLWDWHG 'HWHFWLRQ DJHQWV PRQLWRU F\EHU HQYLURQPHQWV DQG WU\ WR GHWHFW DEQRUPDO DFWLYLWLHV :KHQ WKHVH DJHQWV VSRW PDOLFLRXV DFWLYLWLHV WKH\ SURDFWLYHO\ VHQG RXW GHFHQWUDOL]HG LQVWUXFWLRQV WR FRXQWHUDWWDFN DJHQWV ZKLFK DUH WKHQ DFWLYDWHG WR SUHYHQW PLWLJDWH RU HYHQ FRXQWHUDWWDFN QHWZRUN LQWUXGHUV 33
Artificial Neural Networks to Prevent Malicious Intrusions $QRWKHU WHFKQLTXH WKDW HPHUJHG IURP WKH ¿HOG RI $, LV WKH DUWL¿FLDO QHXUDO QHWZRUN $11 $11V DUH VWDWLVWLFDO OHDUQLQJ PRGHOV LPLWDWLQJ WKH VWUXFWXUH DQG WKH IXQFWLRQ RI WKH KXPDQ EUDLQ 7KH\ FDQ KHOS WR OHDUQ DQG VROYH SUREOHPV HVSHFLDOO\ LQ HQYLURQPHQWV ZKHUH DOJRULWKPV RU UXOHV IRU VROYLQJ D SUREOHP DUH GLI¿FXOW WR H[SUHVV RU DUH XQNQRZQ 6LQFH $11V¶ V\VWHP EHKDYLRU LV NLQG RI HOXVLYH WKH\ DUH FRQVLGHUHG XQGH¿QHG EODFN ER[ PRGHOV 34 ,Q F\EHUVHFXULW\ $11V KDYH EHHQ XVHG VXFFHVVIXOO\ ZLWKLQ DOO VWDJHV RI ,6$V DQG KHQFH FDQ HQFDSVXODWH DOO SKDVHV RI WKH F\EHU NLOO FKDLQ ,QWHJUDWHG LQ F\EHUVHFXULW\ $11V FDQ EH XVHG IRU PRQLWRULQJ QHWZRUN WUDI¿F $V GHSLFWHG LQ )LJXUH EHORZ PDOLFLRXV LQWUXVLRQV FDQ EH GHWHFWHG DOUHDG\ GXULQJ WKH GHOLYHU\ SKDVH DQG EHIRUH DQ DFWXDO DWWDFN RFFXUV 35 7KLV LV D GHVLUHG JRDO RI F\EHUVHFXULW\ DQG LW LV D JUHDW DFKLHYHPHQW ZKHQ F\EHUDWWDFNV FDQ EH KLQGHUHG EHIRUH WKH\ WDNH SODFH WKXV HODERUDWLQJ XSRQ WKH PDLQ LGHD RI SHULPHWHU GHIHQVH 36 $11V FDQ EH VXFFHVVIXOO\ XVHG WR OHDUQ IURP SDVW QHWZRUN DFWLYLWLHV DQG DWWDFNV LQ RUGHU WR SUHYHQW IXWXUH DWWDFNV IURP DFWXDOO\ WUDQVSLULQJ
Figure 3: Artificial Neural Networks to Prevent Attacks within an Integrated Security Approach
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
111
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
112
&RPSDUHG WR FRQYHQWLRQDO WHFKQLTXHV XVHG IRU F\EHU GHIHQVH WKH JUHDW DGYDQWDJH RI XVLQJ $11V LV WKHLU OHDUQLQJ DELOLW\ $V PHQWLRQHG DERYH SDWWHUQV WKDW GHVFULEH QRUPDO DQG DEQRUPDO QHWZRUN DFWLYLWLHV DUH WUDGLWLRQDOO\ GH¿QHG PDQXDOO\ E\ VHFXULW\ SURIHVVLRQDOV EDVHG RQ WKHLU H[SHUW NQRZOHGJH $11V KRZHYHU FDQ EH WUDLQHG WR LGHQWLI\ VXFK SDWWHUQV DXWRPDWLFDOO\ E\ XVLQJ SUHYLRXV GDWD WKDW KDV EHHQ WUDQVIHUUHG RYHU WKH QHWZRUN :LWKLQ DQ DQRPDO\ EDVHG ,'36 DSSURDFK LW ZDV VKRZQ WKDW $11V FDQ EH VXFFHVVIXOO\ XWLOL]HG WR HYDOXDWH KHDGHU LQIRUPDWLRQ37 RI QHWZRUN GDWD packages to learn SDWWHUQV IRU QRUPDO QHWZRUN EHKDYLRU ,Q D ¿UVW SUHSDUDWRU\ VWHS WKH $11 ZDV WUDLQHG WR LGHQWLI\ DQG OHDUQ SDWWHUQV RI KHDGHU DWWULEXWHV WKDW EHORQJHG WR QRUPDO QHWZRUN WUDI¿F (YHU\ IXWXUH GDWD SDFNHW WKDW ZDV WUDQVIHUUHG RYHU WKH PRQLWRUHG QHWZRUN ZDV FRPSDUHG DIWHUZDUGV ZLWK WKHVH SUH OHDUQHG SDWWHUQV :KHQ DWWULEXWHV RI SDFNHW KHDGHUV PDWFKHG WKH normal SDWWHUQ WKH\ ZHUH WUDQVIHUUHG DV XVXDO ,UUHJXODULWLHV LQ D GDWD SDFNHW¶V KHDGHU LQIRUPDWLRQ WKDW PLVPDWFKHG WKH OHDUQHG SDWWHUQ ZHUH FODVVL¿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¿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
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
VHH WUDGLWLRQDO DSSURDFKHV RI F\EHUVHFXULW\ VKLIWLQJ IURP DWWDFN GHWHFWLRQ WR DWWDFN SUHYHQWLRQ '11 WHFKQLTXHV FDQ QRZ SRVVLEO\ OHDG LQ D QHZ SKDVH RI F\EHUVHFXULW\²QDPHO\ F\EHUDWWDFN SUHGLFWLRQ
Expert Systems to Provide Decision Support for Security Professionals ([SHUW V\VWHPV DUH FRPSXWHU SURJUDPV GHVLJQHG WR SURYLGH GHFLVLRQ VXSSRUW IRU FRPSOH[ SUREOHPV LQ D GRPDLQ WKHVH DUH WKH PRVW ZLGHO\ XVHG $, DSSOLFDWLRQ &RQFHSWXDOO\ DQ H[SHUW V\VWHP FRQVLVWV RI D NQRZOHGJH EDVH ZKLFK VWRUHV WKH H[SHUW NQRZOHGJH DQG DQ LQIHUHQFH HQJLQH ZKLFK LV XVHG IRU UHDVRQLQJ DERXW SUHGH¿QHG NQRZOHGJH DV ZHOO DV ¿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¿QHG E\ H[SHUWV 5XOHV FRQVLVW RI WZR SDUWV D FRQGLWLRQ DQG DQ DFWLRQ 3UREOHPV DUH DQDO\]HG VWHSZLVH ¿UVW WKH FRQGLWLRQ LV HYDOXDWHG DQG WKHQ WKH DFWLRQ WKDW VKRXOG EH WDNHQ QH[W LV GHWHUPLQHG 8QOLNH &%5 V\VWHPV 5%6V DUH QRW DEOH WR OHDUQ QHZ UXOHV RU DXWRPDWLFDOO\ PRGLI\ H[LVWLQJ UXOHV 7KLV IDFW UHIHUV WR WKH ³NQRZOHGJH DFTXLVLWLRQ SUREOHP ´ which is crucial in adapting WR G\QDPLF HQYLURQPHQWV 44 6HFXULW\ SURIHVVLRQDOV ZLGHO\ XVH H[SHUW V\VWHPV IRU GHFLVLRQ VXSSRUW LQ F\EHU HQYLURQPHQWV ,Q JHQHUDO HYDOXDWLQJ VHFXULW\ V\VWHPV¶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¿FLHQWO\ FI UHDFW UHVSRQG LQ )LJXUH EHORZ
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
113
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
114
$W WKLV SRLQW LW LV FUXFLDO WR UHFDOO WKDW H[SHUW V\VWHPV VR IDU VROHO\ DVVLVW GHFLVLRQ PDNHUV EXW DUH QRW DEOH WR VXEVWLWXWH IRU WKHP
Figure 4: Expert Systems to Support React & Response Measures in an Integrated Security Approach
Drawbacks of Artificial Intelligence within Cybersecurity 7KH SUHYLRXV VHFWLRQ GLVFXVVHG WKH EHQH¿WV RI $, DV ZHOO DV WKH YDULRXV WHFKQLTXHV WKDW FDQ DGGUHVV VLJQL¿FDQW WHFKQRORJLFDO LVVXHV LQ WRGD\¶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²WKDQNV WR DGYDQFHV LQ KDUGZDUH 7KH JURZLQJ QHHG KRZHYHU IRU ELJ GDWD FDQ KDYH D QHJDWLYH VLGH ZKHQ LW FRPHV WR GDWD SULYDF\ 7KH DQDO\VLV RI KXJH DPRXQWV RI GDWD PD\ FDXVH SULYDWH DV ZHOO DV SXEOLF RUJDQL]DWLRQV WR EH FRQFHUQHG DERXW WKH SULYDF\ RI WKHLU SHUVRQDO GDWD DQG VRPH DUH HYHQ XQZLOOLQJ WR VKDUH WKLV GDWD DW DOO :KDW SHUVRQDO GDWD LV XVHG ZK\ LW LV XVHG DQG KRZ FRQFOXVLRQV DUH UHDFKHG ZLWKLQ $, EDVHG VROXWLRQV PD\ UHPDLQ XQDQVZHUHG DQG PD\ QRW EH WUDQVSDUHQW IRU DIIHFWHG RUJDQL]DWLRQV F /DFN RI UHJXODWLRQ $OWKRXJK WKHUH DUH YDULRXV OHJDO FRQFHUQV DERXW $, WKH RQH FRQFHUQ WKDW LV PRVW SUHYDOHQW LV WKH ORVV RI KXPDQ FRQWURO RYHU WKH FRQVHTXHQFHV RI $,¶V DXWRQRP\ 'XH WR WKH XQLTXH DQG XQIRUHVHHDEOH QDWXUH RI $, H[LVWLQJ OHJDO IUDPHZRUNV GR QRW QHFHVVDULO\ DSSO\ WR WKLV GLVFLSOLQH 49
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
G (WKLFDO FRQFHUQV $, EDVHG VHFXULW\ V\VWHPV LQFUHDVLQJO\ PDNH GHFLVLRQV IRU KXPDQ LQGLYLGXDOV RU DVVLVW WKHP WR GR VR H J DV GLVFXVVHG DERYH LQ WKH FDVH RI ([SHUW 6\VWHPV &RQVLGHULQJ WKLV GHYHORSPHQW LW LV SDUWLFXODUO\ ZRUULVRPH WKDW WKHVH V\VWHPV GR QRW FXUUHQWO\ KDYH D PRUDO FRGH &RQVHTXHQWO\ WKH GHFLVLRQV WKDW DUH PDGH IRU XV DUH QRW QHFHVVDULO\ WKH RQHV WKDW D SHUVRQ ZRXOG WDNH 50
Conclusions $, LV FRQVLGHUHG DV RQH RI WKH PRVW SURPLVLQJ GHYHORSPHQWV LQ WKH LQIRUPDWLRQ DJH DQG F\EHUVHFXULW\ DUJXDEO\ LV WKH GLVFLSOLQH WKDW FRXOG EHQH¿W PRVW IURP LW 1HZ DOJRULWKPV WHFKQLTXHV WRROV DQG HQWHUSULVHV RIIHULQJ $, EDVHG VHUYLFHV DUH FRQVWDQWO\ HPHUJLQJ RQ WKH JOREDO VHFXULW\ PDUNHW &RPSDUHG WR FRQYHQWLRQDO F\EHUVHFXULW\ VROXWLRQV WKHVH V\VWHPV DUH PRUH ÀH[LEOH DGDSWDEOH DQG UREXVW WKXV KHOSLQJ WR LPSURYH VHFXULW\ SHUIRUPDQFH DQG EHWWHU SURWHFW V\VWHPV IURP DQ LQFUHDVLQJ QXPEHU RI VRSKLVWLFDWHG F\EHUWKUHDWV &XUUHQWO\ GHHS OHDUQLQJ WHFKQLTXHV DUH SRVVLEO\ WKH PRVW SURPLVLQJ DQG SRZHUIXO WRROV LQ WKH UHDOP RI $, '11V FDQ SUHGLFW F\EHUDWWDFNV LQ DGYDQFH LQVWHDG RI VROHO\ SUHYHQWLQJ WKHP DQG PLJKW OHDG WR D QHZ SKDVH RI F\EHUVHFXULW\ 'HVSLWH WKH SURPLVLQJ QDWXUH RI $, LW KDV HPHUJHG DV D JOREDO ULVN IRU KXPDQ FLYLOL]DWLRQ ZKLOH WKH ULVNV DQG FRQFHUQV IRU LWV XVH LQ F\EHUVSDFH DUH MXVWL¿HG +HUH IRXU PDMRU LVVXHV FDQ EH LGHQWL¿HG WKH ODFN RI $,¶V IXOO DXWRQRP\ FRQFHUQV DERXW GDWD SULYDF\ WKH DEVHQFH RI VXI¿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
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
115
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
116
VWURQJ LQWHUGHSHQGHQFH EHWZHHQ $, V\VWHPV DQG KXPDQ IDFWRUV LV QHFHVVDU\ IRU DXJPHQWLQJ F\EHUVHFXULW\¶V PDWXULW\ 0RUHRYHU D KROLVWLF YLHZ RQ WKH F\EHU HQYLURQPHQW RI RUJDQL]DWLRQV LV UHTXLUHG &\EHUVHFXULW\ LV QRW RQO\ D WHFKQRORJLFDO LVVXH LW LV DOVR DERXW UHJXODWLRQ DQG WKH ZD\ WKDW VHFXULW\ ULVNV DUH GHDOW ZLWK ,W LV QHFHVVDU\ WR LQWHJUDWH DQ\ WHFKQLFDO VROXWLRQV UHOHYDQW SURFHVVHV DQG SHRSOH LQWR DQ ,6$ IUDPHZRUN WR DFKLHYH RSWLPDO VHFXULW\ SHUIRUPDQFH ,Q WKH HQG LW LV VWLOO WKH KXPDQ IDFWRU WKDW PDWWHUV²QRW RQO\ WKH WRROV
Notes ,Q 5REHUW 7DSSHQ 0RUULV D JUDGXDWH VWXGHQW LQ FRPSXWHU VFLHQFH ZURWH WKH ¿UVW FRPSXWHU SURJUDP ZKLFK ZDV GLVWULEXWHG YLD WKH LQWHUQHW WKH 0RUULV :RUP 7KH SURJUDP ZDV QRW GHVLJQHG WR FDXVH GDPDJH EXW UDWKHU WR JDXJH WKH VL]H RI WKH LQWHUQHW D FULWLFDO HUURU KRZHYHU WUDQVIRUPHG WKH SURJUDP FDXVLQJ LW WR ODXQFK WKH ¿UVW GHQLDO RI VHUYLFH DWWDFN $ERXW WKH ,'36 ZHDNQHVVHV VHH $PMDG 5HKPDQ DQG 7DQ]LOD 6DED ³(YDOXDWLRQ RI $UWL¿FLDO ,QWHOOLJHQW 7HFKQLTXHV WR 6HFXUH ,QIRUPDWLRQ LQ (QWHUSULVHV ´ $UWL¿FLDO ,QWHOOLJHQFH 5HYLHZ QR ± HVSHFLDOO\ WKH VHFWLRQ ³3HUIRUPDQFH LVVXHV ,'6 ´ 6HOPD 'LOHN + VH\LQ dDNÕU DQG 0XVWDID $\GÕQ ³$SSOLFDWLRQV RI $UWL¿FLDO ,QWHOOLJHQFH 7HFKQLTXHV WR &RPEDWLQJ &\EHU &ULPHV $ 5HYLHZ ´ International -RXUQDO RI $UWL¿FLDO ,QWHOOLJHQFH $SSOLFDWLRQV QR ± (QQ 7\XJX ³$UWL¿FLDO ,QWHOOLJHQFH LQ &\EHU 'HIHQVH ´ LQ Proceedings of 3rd ,QWHUQDWLRQDO &RQIHUHQFH RQ &\EHU &RQÀLFW >,&&&@ ± -XQH 7DOOLQQ Estonia HGV & &]RVVHFN ( 7\XJX DQG 7 :LQJ¿HOG 7DOOLQQ (VWRQLD &&' &2( SS ± ;LDR ELQ :DQJ *XDQJ \XDQ <DQJ <L FKDR /L DQG 'DQ /LX ³5HYLHZ RQ WKH $SSOLFDWLRQ RI $UWL¿FLDO ,QWHOOLJHQFH LQ $QWLYLUXV 'HWHFWLRQ 6\VWHP ´ Cybernetics and Intelligent Systems ± 7KH *OREDO &KDOOHQJHV )RXQGDWLRQ VWDWHV $, DV RQH RI WZR HPHUJLQJ ULVNV WKDW PLJKW WKUHDWHQ PDQNLQG LQ WKH IXWXUH )RU PRUH VHH 'HQQLV 3DPOLQ DQG 6WXDUW $UPVWURQJ ³*OREDO &KDOOHQJHV²7ZHOYH ULVNV WKDW WKUHDWHQ KXPDQ FLYLOLVDWLRQ ´ *OREDO &KDOOHQJHV )RXQGDWLRQ KWWS JOREDOFKDOOHQJHV RUJ ZS FRQWHQW XSORDGV 5LVNV ZLWK LQ¿QLWH LPSDFW SGI 6WXDUW 5XVVHOO 7RP 'LHWWHULFK (ULF +RUYLW] %DUW 6HOPDQ )UDQFHVFD 5RVVL 'HPLV +DVVDELV 6KDQH /HJJ 0XVWDID 6XOH\PDQ 'LOHHS *HRUJH DQG 6FRWW 3KRHQL[ ³5HVHDUFK 3ULRULWLHV IRU 5REXVW DQG %HQH¿FLDO $UWL¿FLDO ,QWHOOLJHQFH $Q 2SHQ /HWWHU ´ AI Magazine QR ± 0\ 'LJLWDO 6KLHOG ³$ +LVWRU\ RI &\EHUVHFXULW\ +RZ &\EHUVHFXULW\ +DV &KDQJHG LQ WKH /DVW <HDUV ´ 2FWREHU KWWS ZZZ P\GLJLWDOVKLHOG FRP KLVWRU\ F\EHU VHFXULW\ F\EHU VHFXULW\ FKDQJHG ODVW \HDUV 5HKPDQ DQG 6DED ³(YDOXDWLRQ RI $UWL¿FLDO ,QWHOOLJHQW 7HFKQLTXHV ´
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
117 7KHUH DUH YDULRXV DSSURDFKHV WR GHVFULEH WKH GLIIHUHQW VWDJHV RI D F\EHUDWWDFN 7KLV DUWLFOH UHIHUV WR WKH Cyber Kill Chain® E\ /RFNKHHG 0DUWLQ ZKLFK KDV EHHQ ZLGHO\ XVHG E\ WKH VHFXULW\ FRPPXQLW\ )RU PRUH VHH ZZZ ORFNKHHGPDUWLQ FRP *DEL 6LERQL ³$Q ,QWHJUDWHG 6HFXULW\ $SSURDFK 7KH .H\ WR &\EHU 'HIHQVH ´ Georgetown Journal of International Affairs 0D\ KWWS MRXUQDO JHRUJHWRZQ HGX DQ LQWHJUDWHG VHFXULW\ DSSURDFK WKH NH\ WR F\EHU GHIHQVH 7RQ\ 6DJHU ³.LOOLQJ $GYDQFHG 7KUHDWV LQ 7KHLU 7UDFNV $Q ,QWHOOLJHQW $SSURDFK WR $WWDFN 3UHYHQWLRQ ´ $ 6$16 $QDO\VW :KLWHSDSHU KWWSV ZZZ VDQV RUJ UHDGLQJ URRP ZKLWHSDSHUV DQDO\VW NLOOLQJ DGYDQFHG WKUHDWV WUDFNV LQWHOOLJHQW DSSURDFK DWWDFN SUHYHQWLRQ &\EHU LQWHOOLJHQFH LV PRUH WKDQ WKH DYDLODELOLW\ RI UDZ GDWD UDWKHU LW SURYLGHV DFWLRQDEOH LQIRUPDWLRQ RI SUH VRUWHG SURFHVVHG DQG HYDOXDWHG GDWD )RU PRUH DERXW F\EHU WKUHDW LQWHOOLJHQFH DQG WKH FRQFHSWXDO GHOLPLWDWLRQ RI F\EHU LQWHOOLJHQFH DQG F\EHU LQIRUPDWLRQ VHH ³:KDW ,V &\EHU 7KUHDW ,QWHOOLJHQFH DQG :K\ 'R , 1HHG ,W"´ L6,*+7 3DUWQHUV ,QF KWWS ZZZ LVLJKWSDUWQHUV FRP ZS FRQWHQW XSORDGV L6,*+7B3DUWQHUVB:KDWB,VB B&ODULW\B%ULHI SGI 6LERQL ³$Q ,QWHJUDWHG 6HFXULW\ $SSURDFK ´ $KPHG 3DWHO 0RQD 7DJKDYL .DYHK %DNKWL\DUL DQG -RDTXLP &HOHVWLQR -~QLRU ³$Q ,QWUXVLRQ 'HWHFWLRQ DQG 3UHYHQWLRQ 6\VWHP LQ &ORXG &RPSXWLQJ $ 6\VWHPDWLF 5HYLHZ ´ Journal of Network and Computer Applications QR -DQXDU\ ± 6XVDQ 0 %ULGJHV DQG 5D\IRUG % 9DXJKQ ³)X]]\ 'DWD 0LQLQJ DQG *HQHWLF $OJRULWKPV $SSOLHG WR ,QWUXVLRQ 'HWHFWLRQ ´ WK $QQXDO &DQDGLDQ ,QIRUPDWLRQ Technology Security Symposium ± 3DWHO 7DJKDYL %DNKWL\DUL DQG &HOHVWLQR -~QLRU ³$Q ,QWUXVLRQ 'HWHFWLRQ DQG 3UHYHQWLRQ 6\VWHP LQ &ORXG &RPSXWLQJ $ 6\VWHPDWLF 5HYLHZ ´ 5HKPDQ DQG 6DED ³(YDOXDWLRQ RI $UWL¿FLDO ,QWHOOLJHQW 7HFKQLTXHV ´ 6DJHU ³.LOOLQJ $GYDQFHG 7KUHDWV LQ 7KHLU 7UDFNV $Q ,QWHOOLJHQW $SSURDFK WR $WWDFN 3UHYHQWLRQ ´ 7KH )HGHUDO )LQDQFLDO ,QVWLWXWLRQV ([DPLQDWLRQ &RXQFLO GHYHORSHG WKH &\EHUVHFXULW\ $VVHVVPHQW 7RRO WR KHOS RUJDQL]DWLRQV LGHQWLI\ WKHLU ULVNV DQG GHWHUPLQH WKHLU F\EHUVHFXULW\ SUHSDUHGQHVV 7KH PDWXULW\ OHYHO KHOSV RUJDQL]DWLRQV WR GHWHUPLQH ZKHWKHU WKHLU EHKDYLRUV SUDFWLFHV DQG SURFHVVHV FDQ VXSSRUW WKHLU F\EHUVHFXULW\ SUHSDUHGQHVV ,W DOVR LGHQWL¿HV SRWHQWLDO DFWLRQV WKDW ZRXOG LQFUHDVH WKLV SUHSDUHGQHVV )RU PRUH VHH KWWSV ZZZ I¿HF JRY F\EHUDVVHVVPHQWWRRO KWP $PLUXGLQ $EGXO :DKDE ³)DFLQJ &\EHUDWWDFNV LQ DQG %H\RQG ´ The Star, -DQXDU\ KWWS ZZZ WKHVWDU FRP P\ WHFK WHFK RSLQLRQ IDFLQJ F\EHU DWWDFNV LQ DQG EH\RQG 5HKPDQ DQG 6DED ³(YDOXDWLRQ RI $UWL¿FLDO ,QWHOOLJHQW 7HFKQLTXHV ´ /LQGD 2QGUHM 7RGG 9ROOPHU DQG 0LORV 0DQLF ³1HXUDO 1HWZRUN %DVHG ,QWUXVLRQ 'HWHFWLRQ 6\VWHP IRU &ULWLFDO ,QIUDVWUXFWXUHV ´ ,QWHUQDWLRQDO -RLQW Conference on Neural Networks $WODQWD *$ ±
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
118 <RVKXD %HQJLR ³/HDUQLQJ 'HHS $UFKLWHFWXUHV IRU $, ´ Foundations and Trends® in Machine Learning QR ± 7\XJX ³$UWL¿FLDO ,QWHOOLJHQFH LQ &\EHU 'HIHQVH ´ ³)L[HG´ DOJRULWKPV XVH KDUG ZLUHG ORJLF RQ GHFLVLRQ OHYHO IRU UHDVRQLQJ DERXW GDWD 6HH ,ELG 2OLQ +\GH ³0DFKLQH /HDUQLQJ IRU &\EHUVHFXULW\ DW 1HWZRUN 6SHHG 6FDOH ´ DQ ,QYLWDWLRQ WR &ROODERUDWH RQ WKH 8VH RI $UWL¿FLDO ,QWHOOLJHQFH DJDLQVW $GDSWLYH $GYHUVDULHV DL RQH ZZZ DL RQH FRP ³1RLVH´ UHIHUV WR LQDFFXUDWH RU LUUHOHYDQW LQIRUPDWLRQ LQ WKH FROOHFWHG GDWD ,1)26(& ,QVWLWXWH ³&\EHUVHFXULW\ DQG $UWL¿FLDO ,QWHOOLJHQFH $ 'DQJHURXV 0L[ ´ )HEUXDU\ KWWS UHVRXUFHV LQIRVHFLQVWLWXWH FRP F\EHUVHFXULW\ DUWL¿FLDO LQWHOOLJHQFH GDQJHURXV PL[ $ FRJQLWLYH F\EHU HQWLW\ FDQ EH XQGHUVWRRG DV D VLQJOH SURJUDP HLWKHU VRIWZDUH RU KDUGZDUH WKDW KDV KXPDQ OLNH FRJQLWLYH FDSDELOLWLHV ,Q WKH UHDOP RI $, WKH FRJQLWLYH DELOLWLHV RI DQ LQWHOOLJHQW DJHQW ZRXOG LQFOXGH SHUFHSWLRQ RI WKH F\EHU HQYLURQPHQW DFTXLVLWLRQ DQDO\VLV RI GDWD JDWKHUHG DFURVV F\EHUVSDFH DQG UHDVRQLQJ DERXW WKDW GDWD 6WDQ )UDQNOLQ DQG $UW *UDHVVHU ³,V ,W DQ $JHQW RU -XVW D 3URJUDP" $ 7D[RQRP\ IRU $XWRQRPRXV $JHQWV ´ Third International Workshop on Agent Theories, Architectures, and Languages /RQGRQ 6SULQJHU 9HUODJ ± $OHVVDQGUR *XDULQR ³$XWRQRPRXV ,QWHOOLJHQW $JHQWV LQ &\EHU 2IIHQFH ´ LQ 5th ,QWHUQDWLRQDO &RQIHUHQFH RQ &\EHU &RQÃ&#x20AC;LFW HGV . 3RGLQV - 6WLQLVVHQ DQG 0 0D\EDXP 7DOOLQQ (VWRQLD 1$72 &&' &2( ± 7\XJX ³$UWL¿FLDO ,QWHOOLJHQFH LQ &\EHU 'HIHQVH ´ ;LD <H DQG -XQVKDQ /L ³$ 6HFXULW\ $UFKLWHFWXUH %DVHG RQ ,PPXQH $JHQWV IRU 0$1(7 ´ International Conference on Wireless Communication and Sensor Computing ± &KULVWLDQ %LWWHU 'DYLG $ (OL]RQGR DQG 7LP :DWVRQ ³$SSOLFDWLRQ RI $UWL¿FLDO 1HXUDO 1HWZRUNV DQG 5HODWHG 7HFKQLTXHV WR ,QWUXVLRQ 'HWHFWLRQ ´ World Congress on Computational Intelligence ± ,ELG 7\XJX ³$UWL¿FLDO ,QWHOOLJHQFH LQ &\EHU 'HIHQVH ´ 3DFNHW KHDGHUV FRQWDLQ DWWULEXWHV OLNH WKH OHQJWK RI WKH WUDQVIHUUHG GDWD WKH QHWZRUN SURWRFRO W\SH RU WKH VRXUFH DQG GHVWLQDWLRQ DGGUHVVHV RI D GDWD SDFNHW 7KHUHIRUH WKH SDFNHW KHDGHU FDUULHV LQIRUPDWLRQ WKDW FDQ EH VXI¿FLHQWO\ XVHG WR GLIIHUHQWLDWH QRUPDO QHWZRUN EHKDYLRU IURP LQWUXVLRQ DWWHPSWV 2QGUHM 9ROOPHU DQG 0DQLF ³1HXUDO 1HWZRUN %DVHG ,QWUXVLRQ 'HWHFWLRQ 6\VWHP ´ %LWWHU DQG RWKHUV ³$SSOLFDWLRQ RI $UWL¿FLDO 1HXUDO 1HWZRUNV DQG 5HODWHG 7HFKQLTXHV WR ,QWUXVLRQ 'HWHFWLRQ ´ 7KH H[SHULPHQWDO VLPXODWLRQV RI PDOZDUH GHWHFWLRQ HPSKDVL]HG ZRUP DQG VSDP GHWHFWLRQ )RU PRUH VHH 'LPD 6WRSHO 5REHUW 0RVNRYLWFK =YL %RJHU <XYDO 6KDKDU DQG <XYDO (ORYLFL ³8VLQJ $UWL¿FLDO 1HXUDO 1HWZRUNV WR 'HWHFW 8QNQRZQ
NADINE WIRKUTTIS AND HADAS KLEIN | ISRAELI CYBERSPACE REGULATION: A CONCEPTUAL FRAMEWORK
41
42
47
49
Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017
119 &RPSXWHU :RUPV ´ Neural Computing and Applications QR Âą Geoffrey E. Hinton, Simon Osindero, and Yee-Whye Teh, â&#x20AC;&#x153;A Fast Learning Algorithm for Deep Belief Nets,â&#x20AC;? Neural Computation 18, no. 7 (2006): 1527â&#x20AC;&#x201C; 1554. 9LFWRU 7KRPVRQ Âł&\EHU $WWDFNV &RXOG %H 3UHGLFWHG :LWK $UWLÂżFLDO ,QWHOOLJHQFH ´ iTechPost $SULO ZZZ LWHFKSRVW FRP DUWLFOHV F\EHU DWWDFNV SUHGLFWHG DUWLÂżFLDO LQWHOOLJHQFH KHOS KWP 7\XJX Âł$UWLÂżFLDO ,QWHOOLJHQFH LQ &\EHU 'HIHQVH ´ 6HUHQD + &KHQ $QWKRQ\ - -DNHPDQ DQG -RKQ 3 1RUWRQ Âł$UWLÂżFLDO ,QWHOOLJHQFH 7HFKQLTXHV $Q ,QWURGXFWLRQ WR 7KHLU 8VH IRU 0RGHOOLQJ (QYLURQPHQWDO 6\VWHPV ´ Mathematics and Computers in Simulation QR Âą Âą ,ELG 'HEUD $QGHUVRQ 7KDQH )ULYROG DQG $OIRQVR 9DOGHV Âł1H[W *HQHUDWLRQ ,QWUXVLRQ 'HWHFWLRQ ([SHUW 6\VWHP 1,'(6 $ 6XPPDU\ ´ 65, ,QWHUQDWLRQDO &RPSXWHU 6FLHQFH /DERUDWRU\ 0D\ .DWKHULQH 1R\HV Âł$ , +XPDQV 6HULRXV &\EHUVHFXULW\ ´ Computerworld, $SULO ZZZ FRPSXWHUZRUOG FRP DUWLFOH VHFXULW\ DL KXPDQV VHULRXV F\EHUVHFXULW\ KWPO 7RP 6LPRQLW Âł0LFURVRIW DQG *RRJOH :DQW WR /HW $UWLÂżFLDO ,QWHOOLJHQFH /RRVH RQ 2XU 0RVW 3ULYDWH 'DWD ´ MIT Technology Review $SULO KWWSV ZZZ WHFKQRORJ\UHYLHZ FRP V PLFURVRIW DQG JRRJOH ZDQW WR OHW DUWLÂżFLDO LQWHOOLJHQFH ORRVH RQ RXU PRVW SULYDWH GDWD %HUQG 6WDKO 'DYLG (OL]RQGR 0RLUD &DUUROO 0D\HU <LQJTLQ =KHQJ DQG .XWRPD :DNXQXPD Âł(WKLFDO DQG /HJDO ,VVXHV RI WKH 8VH RI &RPSXWDWLRQDO ,QWHOOLJHQFH 7HFKQLTXHV LQ &RPSXWHU 6HFXULW\ DQG &RPSXWHU )RUHQVLFV ´ 7KH International Joint Conference on Neural Networks (IJCNN) Âą 1LFN %RVWURP Âł(WKLFDO ,VVXHV LQ $GYDQFHG $UWLÂżFLDO ,QWHOOLJHQFH ´ LQ Cognitive, (PRWLYH DQG (WKLFDO $VSHFWV RI 'HFLVLRQ 0DNLQJ LQ +XPDQV DQG LQ $UWLÂżFLDO Intelligence HGV ,YD 6PLW DQG *HRUJH ( /DVNHU :LQGVRU 21 ,QWHUQDWLRQDO ,QVWLWXWH IRU $GYDQFHG 6WXGLHV LQ 6\VWHPV 5HVHDUFK &\EHUQHWLFV Âą