Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center

被引:3
作者
Ghadermazi, Jalal [1 ]
Shah, Ankit [1 ]
Jajodia, Sushil [2 ]
机构
[1] Univ S Florida, 4202 E Fowler Ave, Tampa, FL 33620 USA
[2] George Mason Univ, Ctr Secure Informat Syst, 10401 York River Rd, Fairfax, VA 22030 USA
来源
DIGITAL THREATS: RESEARCH AND PRACTICE | 2024年 / 5卷 / 02期
基金
美国国家科学基金会;
关键词
Cyber alert management; ML and optimization framework; unsupervised learning; mathematical programming; alert clusters; analysts to alerts assignment; ANALYSTS; SENSORS;
D O I
10.1145/3644393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity operations centers (CSOCs) protect organizations by monitoring network traffic and detecting suspicious activities in the form of alerts. The security response team within CSOCs is responsible for investigating and mitigating alerts. However, an imbalance between alert volume and available analysts creates a backlog, putting the network at risk of exploitation. Recent research has focused on improving the alert-management process by triaging alerts, optimizing analyst scheduling, and reducing analyst workload through systematic discarding of alerts. However, these works overlook the delays caused in alert investigations by several factors, including: (i) false or benign alerts contributing to the backlog; (ii) analysts experiencing cognitive burden from repeatedly reviewing unrelated alerts; and (iii) analysts being assigned to alerts that do not match well with their expertise. We propose a novel framework that considers these factors and utilizes machine learning and mathematical optimization methods to dynamically improve throughput during work shifts. The framework achieves efficiency by automating the identification and removal of a portion of benign alerts, forming clusters of similar alerts, and assigning analysts to alerts with matching attributes. Experiments conducted using real-world CSOC data demonstrate a 60.16% reduction in the alert backlog for an 8-h work shift compared to currently employed approach.
引用
收藏
页数:23
相关论文
共 43 条
[1]   A two-stage stochastic program for multi-shift, multi-analyst, workforce optimization with multiple on-call options [J].
Altner, Douglas S. ;
Rojas, Anthony C. ;
Servi, Leslie D. .
JOURNAL OF SCHEDULING, 2018, 21 (05) :517-531
[2]   Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest [J].
Aminanto, Muhamad Erza ;
Zhu, Lei ;
Ban, Tao ;
Isawa, Ryoichi ;
Takahashi, Takeshi ;
Inoue, Daisuke .
2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, :330-332
[3]   The Role of Machine Learning in Cybersecurity [J].
Apruzzese, Giovanni ;
Laskov, Pavel ;
de Oca, Edgardo Montes ;
Mallouli, Wissam ;
Rapa, Luis Burdalo ;
Grammatopoulos, Athanasios Vasileios ;
Di Franco, Fabio .
DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01)
[4]   SoK: The Impact of Unlabelled Data in Cyberthreat Detection [J].
Apruzzese, Giovanni ;
Laskov, Pavel ;
Tastemirova, Aliya .
2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, :20-42
[5]   Detection and Threat Prioritization of Pivoting Attacks in Large Networks [J].
Apruzzese, Giovanni ;
Pierazzi, Fabio ;
Colajanni, Michele ;
Marchetti, Mirco .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) :404-415
[6]  
Apruzzese G, 2018, INT CONF CYBER CONFL, P371, DOI 10.23919/CYCON.2018.8405026
[7]  
Chandran Sathya, 2016, Proceedings of SOUPS 2016: Twelfth Symposium on Usable Privacy and Security. SOUPS 2016, P237
[8]   PCAM: A Data-driven Probabilistic Cyber-alert Management Framework [J].
Chen, Haipeng ;
Duncklee, Andrew ;
Jajodia, Sushil ;
Liu, Rui ;
Mcnamara, Sean ;
Subrahmanian, V. S. .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (03)
[9]  
CIS, 2017, Center for Internet Security (CIS)
[10]   The real work of computer network defense analysts - The analysis roles and processes that transform network data into security situation awareness [J].
D'Amico, A. ;
Whitley, K. .
VIZSEC 2007, 2008, :19-37