O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Research Methods for Cyber Security

Book Description

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research.

Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.

  • Presents research methods from a cyber security science perspective
  • Catalyzes the rigorous research necessary to propel the cyber security field forward
  • Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. About the Authors
  6. Foreword
  7. Preface
    1. Purpose
    2. Audience
    3. Organization and Style
  8. Acknowledgments
  9. Part I: Introduction
    1. Part I. Introduction
    2. Chapter 1. Introduction to Science
      1. Abstract
      2. Chapter Objectives
      3. What is Science
      4. Types of Science
      5. Science is Messy
      6. From Ptolemy to Einstein—Science and the Discovery of the Nature of the Sky
      7. Summary and Conclusions
      8. Endnotes
    3. Chapter 2. Science and Cyber Security
      1. Abstract
      2. Chapter Objectives
      3. Defining Cyber Space
      4. Defining Cyber Security
      5. Cyber Security Fundamentals
      6. Cyber Security Controls Overview
      7. Defining a Science of Cyber Security
      8. Challenges in Achieving Security in Cyber Space
      9. Further Reading
      10. Endnotes
    4. Chapter 3. Starting Your Research
      1. Abstract
      2. Chapter Objectives
      3. Starting Your Research
      4. Research before the Research
      5. Selecting Your Research Path
      6. Conferences and Journals
      7. Endnotes
  10. Part II: Observational Research Methods
    1. Part II. Observational Research Methods
    2. Chapter 4. Exploratory Study
      1. Abstract
      2. Chapter Objectives
      3. Knowledge by Inference
      4. Types of Studies
      5. Gathering Data
      6. Exploratory Method Selection
      7. Exploratory Study Method Examples
      8. Analysis Bias
      9. The Search for a Causal Relationship
      10. Reporting Your Results
      11. Endnotes
    3. Chapter 5. Descriptive Study
      1. Abstract
      2. Chapter Objectives
      3. Descriptive Study Methods
      4. Observation Method Selection
      5. Gathering Data
      6. Data Analysis
      7. Descriptive Study Method Examples
      8. Reporting your Results
      9. Endnotes
    4. Chapter 6. Machine Learning
      1. Abstract
      2. Chapter Objectives
      3. What is Machine Learning
      4. Categories of Machine Learning
      5. Debugging Machine Learning
      6. Bayesian Network Mathematical Preliminaries and Model Properties
      7. Hidden Markov Models
      8. Discussion
      9. Sample Format
      10. Endnotes
  11. Part III: Mathematical Research Methods
    1. Part III. Mathematical Research Methods
    2. Chapter 7. Theoretical Research
      1. Abstract
      2. Chapter Objectives
      3. Background
      4. Challenges in Development of Cyber Security Science Theory
      5. Example Theoretical Research Construction
      6. Reporting Your Results
      7. Endnotes
    3. Chapter 8. Using Simulation for Research
      1. Abstract
      2. Chapter Objectives
      3. Defining Simulation
      4. When Should Simulation Be Used
      5. Defining What to Model
      6. Instantiating a Model
      7. Example Use Case
      8. Paper Format
      9. Endnotes
  12. Part IV: Experimental Research Methods
    1. Part IV. Experimental Research Methods
    2. Chapter 9. Hypothetico-deductive Research
      1. Abstract
      2. Chapter Objectives
      3. Purpose of Hypothesis-driven Experimentation
      4. A Proper Hypothesis
      5. Experimentation
      6. Analysis
      7. Integrating the Theory with Results
      8. Reporting Your Results
      9. Endnotes
    3. Chapter 10. Quasi-experimental Research
      1. Abstract
      2. Chapter Objectives
      3. True versus Quasi-experiment
      4. Cyber Drivers for Quasi-experimental Design
      5. Quasi-experiment Research Methods
      6. Reporting Your Results
      7. Endnotes
  13. Part V: Applied Research Methods
    1. Part V. Applied Research Methods
    2. Chapter 11. Applied Experimentation
      1. Abstract
      2. Chapter Objectives
      3. Building From a Theory
      4. Methods of Applied Experimentation
      5. Benchmarking
      6. Reporting Your Results
      7. Validation Testing
      8. Independent Variables
      9. Dependent Variables
      10. Experimental Design
      11. Problems With Validation Testing
      12. Reporting Your Results
      13. Endnotes
    3. Chapter 12. Applied Observational Study
      1. Abstract
      2. Chapter Objectives
      3. Applied Study Types
      4. Applied Observation Method Selection
      5. Data Collection and Analysis
      6. Applied Exploratory Study: Stress Test
      7. Applied Descriptive Study: Case Study
      8. Reporting Your Results
      9. Endnote
  14. Part VI: Additional Materials
    1. Part VI. Additional Materials
    2. Chapter 13. Instrumentation
      1. Abstract
      2. Chapter Objectives
      3. Understanding Your Data Needs
      4. Overview of Data and Sensor Types
      5. Controlled-testing Environments
      6. Conclusion
      7. Endnotes
    3. Chapter 14. Addressing the Adversary
      1. Abstract
      2. Chapter Objectives
      3. Defining Adversary
      4. The Challenge of Adversarial Research
      5. Adversaries in Other Fields of Study
      6. Different Ways to Think About Threats
      7. Integrating Adversary Models into Research
      8. Conclusions
      9. Endnotes
    4. Chapter 15. Scientific Ethics
      1. Abstract
      2. Chapter Objectives
      3. Ethics for Science
      4. History of Ethics in Cyber Security
      5. Ethical Standards
      6. Cyber Security Expert Classification
      7. Cyber Security and the Law
      8. Human Subjects Research
      9. Ethical Use of Data
      10. Individual Responsibility
      11. Conclusion
      12. Endnotes
  15. Index