OutCenTR: A Method for Predicting Exploits of Cyber Vulnerabilities in High Dimensional Datasets

被引:2
作者
Eskandari, Hadi [1 ]
Bewong, Michael [2 ,3 ]
Rahman, Md Geaur [1 ]
Rehman, Sabih Ur [1 ]
机构
[1] Charles Sturt Univ, Sch Comp Math & Engn, Port Macquarie, NSW 2444, Australia
[2] Charles Sturt Univ, Sch Comp Math & Engn, Wagga Wagga, NSW 2650, Australia
[3] Charles Sturt Univ, Artificial Intelligence & Cyber Futures AICF Inst, Bathurst, NSW 2795, Australia
关键词
Vulnerability prediction; cybersecurity management; outlier detection; anomaly detection; dimensionality reduction;
D O I
10.1109/ACCESS.2024.3460402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While an ever-growing number of vulnerabilities are reported every day, all the reported vulnerabilities are not all the same, as some are more targeted than others. Correctly estimating the likelihood of a vulnerability being exploited is a critical task for system administrators in cyber security management as it can help them prioritise and patch the right vulnerabilities. However, due to three key issues: unavailability of labeled training data, high dimensionality, and class imbalance in datasets, the prediction of vulnerabilities can be a challenging problem in practice, especially as the existing methods often only prioritise one issue at a time. In this paper, we propose a method called OutCenTR that can predict the likelihood of a vulnerability being exploited by addressing all the issues concurrently. In OutCenTR, the unavailability of labeled training data is addressed by considering a semi-supervised approach which requires only a few labeled data, the high dimensionality issue is addressed by identifying and removing insignificant features, and the class imbalance issue is addressed by introducing context-based distinguishability scores between records. OutCenTR first determines important features in datasets and then makes use of an existing algorithm to build a classifier by considering only the important features. The classifier is not only effective for predicting exploit of vulnerabilities but also valuable for general-purpose outlier detection. We evaluate the effectiveness of OutCenTR by comparing its performance with the performance of five state-of-the-art methods on four publicly available datasets and twelve synthetic datasets. The methods are evaluated in terms of five criteria, namely: Precision, Recall, F1 Score, ROC, and Execution time. Our initial experimental results clearly indicate that the proposed method, OutCenTR outperforms existing methods.
引用
收藏
页码:133030 / 133044
页数:15
相关论文
共 36 条
[1]   Distance-based outlier detection for high dimension, low sample size data [J].
Ahn, Jeongyoun ;
Lee, Myung Hee ;
Lee, Jung Ae .
JOURNAL OF APPLIED STATISTICS, 2019, 46 (01) :13-29
[2]  
Almukaynizi Mohammed, 2017, 2017 International Conference on Cyber-Conflict (CyCon U.S.), P82, DOI 10.1109/CYCONUS.2017.8167501
[3]   A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats [J].
Alsalman, Dheyaaldin .
IEEE ACCESS, 2024, 12 :14719-14730
[4]  
[Anonymous], 1994, Wiley Series in Probability and Statistics
[5]  
Bozorgi M., 2010, KDD, P105, DOI DOI 10.1145/1835804.1835821
[6]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[7]   LOF: Identifying density-based local outliers [J].
Breunig, MM ;
Kriegel, HP ;
Ng, RT ;
Sander, J .
SIGMOD RECORD, 2000, 29 (02) :93-104
[8]  
Bullough BL, 2017, PROCEEDINGS OF THE 3RD ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2017, P45, DOI 10.1145/3041008.3041009
[9]  
Chen HP, 2019, PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P6503
[10]  
Cheng Z., 2019, P 9 C RES AD CONV SY, P161, DOI DOI 10.1145/3338840.3355641