Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

An Interdisciplinary Approach to Enhancing Cyber Threat Prediction Utilizing Forensic Cyberpsychology and Digital Forensics

Version 1 : Received: 7 December 2023 / Approved: 12 December 2023 / Online: 12 December 2023 (04:13:55 CET)

A peer-reviewed article of this Preprint also exists.

Rich, M.S.; Aiken, M.P. An Interdisciplinary Approach to Enhancing Cyber Threat Prediction Utilizing Forensic Cyberpsychology and Digital Forensics. Forensic Sci. 2024, 4, 110-151. Rich, M.S.; Aiken, M.P. An Interdisciplinary Approach to Enhancing Cyber Threat Prediction Utilizing Forensic Cyberpsychology and Digital Forensics. Forensic Sci. 2024, 4, 110-151.

Abstract

A groundbreaking integrated predictive model, termed Cyber Forensics Behavioral Analysis (CFBA), has been developed in an environment characterized by rapidly evolving and increasingly sophisticated cyber threats. This model merges Cyber Behavioral Sciences with Digital Forensics to enhance the prediction accuracy and effectiveness of cyber threats originating from specific Autonomous System Numbers (ASNs). It has been observed that traditional cybersecurity strategies, predominantly focused on technical aspects, must be improved in addressing the complex landscape of cyber threats. Consequently, a novel approach has been proposed in this research, combining technical expertise with insights into the behavior of cybercriminals, thereby addressing a significant gap in existing methodologies. A mixed-methods approach has been employed in the study, integrating quantitative and qualitative research methods. This approach has created a comprehensive framework incorporating digital forensics, cybersecurity, computer science, forensic psychology, and the cyber behavioral sciences which incorporates disciplines scuch as cyberpsychology and forensic cyberpsychology. The study is anchored around four key concepts: (1) Forensic Cyberpsychology, which focuses on understanding psychological aspects of cybercriminal behavior; (2) Digital Forensics, involving the collection and analysis of digital evidence from cyber incidents; (3) Predictive Modeling, which utilizes historical data and patterns to anticipate potential cyber threats; and (4) the Cyber Behavioral Analysis Metric (CBAM) and Cyber Behavioral Score (CBS), tools designed for evaluating and scoring ASNs based on their behavior in terms of cybersecurity threat risks. Challenges encountered in the development of this integration have been significant. Initial setbacks included the misalignment of traditional cyber defense methods with the evolving nature of cyber threats and the absence of a holistic approach in pre-existing models. Through the narrative of these challenges and the subsequent development of the CFBA model, the research highlights the necessity for an interdisciplinary approach to cybersecurity. The outcomes of this study are not merely theoretical but provide practical, actionable tools and frameworks that markedly improve the precision of predicting cyber threats, especially from ASNs. The CFBA model represents a significant shift in cybersecurity strategies, highlighting the importance of integrating behavioral insights with technical knowledge. The study emphasizes the need for ongoing research and collaboration in cybersecurity, advocating for an approach that is as comprehensive and multifaceted as the cyber threats it seeks to mitigate. This research has been conducted to contribute significantly to cybersecurity, offering new perspectives and methodologies in a rapidly changing domain.

Keywords

forensic cyberpsychology; cyberpsychology; predictive analytics; prophet model; behavioral-centric threat intelligence; ISPs; cyber behavioral analysis; cyber forensics; behavioral analysis; time-series analysis; cyber defense

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.