SPATIO-TEMPORAL ANALYSIS OF DEPENDENT RISK WITH AN APPLICATION TO CYBERATTACKS DATA

被引:1
作者
Kim, Shonghyun [1 ]
Lim, Chae Young [1 ]
Rho, Yeonwoo [2 ]
机构
[1] Seoul Natl Univ, Dept Stat, Seoul, South Korea
[2] Michigan Technol Univ, Dept Math Sci, Houghton, MI USA
基金
新加坡国家研究基金会;
关键词
Clustering; cyberattack; honeypot data; MCMC; spatial-GARCH model; TIME-SERIES; MODELS; STATIONARITY; FRAMEWORK; RATES;
D O I
10.1214/24-AOAS1952
中图分类号
O21 [概率论与数理统计]; C8 [统计学];
学科分类号
020208 ; 070103 ; 0714 ;
摘要
Cybersecurity is an important issue given the increasing risks due to cyberattacks in many areas. Cyberattacks could result in huge losses such as data breaches, failures in the control systems of infrastructures, physical damages in manufacturing industries, etc. As a result, cybersecurity-related research has grown rapidly for in-depth analysis. One main interest is to understand the correlated nature of cyberattack data. To understand such characteristics, we propose a spatio-temporal model for the hostwisely aggregated cyberattack data by incorporating the characteristics of the attackers. We develop a new dissimilarity measure as a proxy of spatial distance to be integrated into the model. The proposed model can be considered as a spatial extension of the GARCH model. The estimation is carried out using a Bayesian approach, which is demonstrated to work well in simulations. The proposed model is applied to publicly available honeypot data after the data are divided by selected features of the attackers via clustering. The estimated model parameters vary by groups of attackers, which was not revealed by modeling the entire dataset.
引用
收藏
页码:3549 / 3569
页数:21
相关论文
共 72 条
[31]   A Stationary Spatio-Temporal GARCH Model [J].
Holleland, Sondre ;
Karlsen, Hans Arnfinn .
JOURNAL OF TIME SERIES ANALYSIS, 2020, 41 (02) :177-209
[32]  
Hyndman R.J., 2018, FORECASTING PRINCIPL, V2nd
[33]   GARCH-Type Models and Performance of Information Criteria [J].
Javed, Farrukh ;
Mantalos, Panagiotis .
COMMUNICATIONS IN STATISTICS-SIMULATION AND COMPUTATION, 2013, 42 (08) :1917-1933
[34]  
KIM S., 2024, Supplement to Spatio-Temporal Analysis of Dependent Risk with an Application to Cyberattacks Data, DOI [10.121424-AOAS1952SUPPA, 10.121424-AOAS1952SUPPB]
[35]  
Kodinariya T.M. P.R. Makwana., 2013, INT J ADV RES COMPUT, V1, P90
[36]   Honeycomb - Creating intrusion detection signatures using honeypots [J].
Kreibich, C ;
Crowcroft, J .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (01) :51-56
[37]   TESTING THE NULL HYPOTHESIS OF STATIONARITY AGAINST THE ALTERNATIVE OF A UNIT-ROOT - HOW SURE ARE WE THAT ECONOMIC TIME-SERIES HAVE A UNIT-ROOT [J].
KWIATKOWSKI, D ;
PHILLIPS, PCB ;
SCHMIDT, P ;
SHIN, YC .
JOURNAL OF ECONOMETRICS, 1992, 54 (1-3) :159-178
[38]   An Empirical Study on Network Anomaly Detection using Convolutional Neural Networks [J].
Kwon, Donghwoon ;
Natarajan, Kathiravan ;
Suh, Sang C. ;
Kim, Hyunjoo ;
Kim, Jinoh .
2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, :1595-1598
[39]   ON THE SELF-SIMILAR NATURE OF ETHERNET TRAFFIC (EXTENDED VERSION) [J].
LELAND, WE ;
TAQQU, MS ;
WILLINGER, W ;
WILSON, DV .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1994, 2 (01) :1-15
[40]   Statistical models for the number of successful cyber intrusions [J].
Leslie, Nandi O. ;
Harang, Richard E. ;
Knachel, Lawrence P. ;
Kott, Alexander .
JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (01) :49-63