Most publicly available data on cyber incidents comes from private companies and non-academic sources. Common sources of information include various security bulletins, white papers, reports, court cases, and blog posts describing specific events, often from a single point of view, followed by occasional academic sources, usually conference proceedings. The main characteristics of the available data sources are: lack of peer review and unavailability of confidential data. In this paper, we use an indirect approach to identify trusted sources used in scientific work. We analyze how top-rated peer reviewed literature relies on the use of non-peer reviewed sources on cybersecurity incidents. To identify current non-peer reviewed sources on cybersecurity we analyze references in top rated peer reviewed computer security conferences. We also analyze how non-peer reviewed sources are used, to motivate or support research. We examined 808 articles from top conferences in field of computer security. The result of this work are list of the most commonly used non-peer reviewed data sources and information about the context in which this data is used. Since these sources are accepted in top conferences, other researchers can consider them in their future research. To the best of our knowledge, analysis on how non-peer reviewed sources are used in cyber-security scientific research has not been done before.
翻译:有关网络事件的公开数据大多来自私营公司和非学术界。共同的信息来源包括各种安全公告、白皮书、报告、法院案例和描述具体事件的博客文章,往往从单一的观点出发,然后是偶尔的学术来源,通常是会议记录。现有数据来源的主要特征是:缺乏同行审查和缺乏保密数据。在本文件中,我们采用间接方法来查明科学工作中使用的可信来源。我们分析了最高等级的同行审查文献如何依赖使用非同行审查的网络安全事件资料来源。为了确定目前非同行审查的网络安全资料来源,我们在最高等级同行审查的计算机安全会议上分析参考文献。我们还分析了如何利用非同行审查来源,激励或支持研究。我们研究了计算机安全领域最高级会议808篇文章。这项工作的结果是列出最常用的非同行审查数据来源和关于这些数据使用背景的信息。由于高层会议接受这些来源,其他研究人员可以在其今后的研究中加以考虑。我们最了解的是,如何利用非同行审查来源来推动或支持计算机安全研究。我们以前没有分析非同行研究来源是如何在网络研究中使用的。