A holistic and proactive approach to forecasting cyber threats

被引:14
作者
Almahmoud, Zaid [1 ]
Yoo, Paul D. [1 ]
Alhussein, Omar [2 ]
Farhat, Ilyas [3 ]
Damiani, Ernesto [4 ,5 ]
机构
[1] Univ London Birkbeck Coll, Dept Comp Sci & Informat Syst, London, England
[2] Huawei Technol Canada, Ottawa, ON, Canada
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON, Canada
[4] Univ Milan, Dept Comp Sci, Milan, Italy
[5] Khalifa Univ, Ctr Cyber Phys Syst C2PS, Abu Dhabi, U Arab Emirates
关键词
PREDICTION; NETWORK;
D O I
10.1038/s41598-023-35198-1
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-matching algorithms help human experts to scan system logs and network traffic for known virus or malware signatures. Recent research has introduced effective Machine Learning (ML) models for cyber-attack detection, promising to automate the task of detecting, tracking and blocking malware and intruders. Much less effort has been devoted to cyber-attack prediction, especially beyond the short-term time scale of hours and days. Approaches that can forecast attacks likely to happen in the longer term are desirable, as this gives defenders more time to develop and share defensive actions and tools. Today, long-term predictions of attack waves are mostly based on the subjective perceptiveness of experienced human experts, which can be impaired by the scarcity of cyber-security expertise. This paper introduces a novel ML-based approach that leverages unstructured big data and logs to forecast the trend of cyber-attacks at a large scale, years in advance. To this end, we put forward a framework that utilises a monthly dataset of major cyber incidents in 36 countries over the past 11 years, with new features extracted from three major categories of big data sources, namely the scientific research literature, news, blogs, and tweets. Our framework not only identifies future attack trends in an automated fashion, but also generates a threat cycle that drills down into five key phases that constitute the life cycle of all 42 known cyber threats.
引用
收藏
页数:15
相关论文
共 55 条
[1]  
Abri F, 2019, IEEE INT CONF BIG DA, P3252, DOI 10.1109/BigData47090.2019.9006514
[2]  
Adamov Abzetdin, 2017, 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), DOI 10.1109/ICIEECT.2017.7916571
[3]  
Alrzini JRS, 2020, V11, P1238, DOI 10.34218/ijaret.11.12.2020.119
[4]  
[Anonymous], 2015, INFOSECURITY MAGAZIN
[5]  
[Anonymous], 2022, TWITTER API V2 DEVEL
[6]  
[Anonymous], 2022, Trends Show Increased Globalized Threat of Ransomware AA22-040A
[7]  
[Anonymous], 2022, SCOPUS PREVIE
[8]  
[Anonymous], 2022, ELSEVIER RES PRODUC
[9]   Accurate prediction of protein structures and interactions using a three-track neural network [J].
Baek, Minkyung ;
DiMaio, Frank ;
Anishchenko, Ivan ;
Dauparas, Justas ;
Ovchinnikov, Sergey ;
Lee, Gyu Rie ;
Wang, Jue ;
Cong, Qian ;
Kinch, Lisa N. ;
Schaeffer, R. Dustin ;
Millan, Claudia ;
Park, Hahnbeom ;
Adams, Carson ;
Glassman, Caleb R. ;
DeGiovanni, Andy ;
Pereira, Jose H. ;
Rodrigues, Andria V. ;
van Dijk, Alberdina A. ;
Ebrecht, Ana C. ;
Opperman, Diederik J. ;
Sagmeister, Theo ;
Buhlheller, Christoph ;
Pavkov-Keller, Tea ;
Rathinaswamy, Manoj K. ;
Dalwadi, Udit ;
Yip, Calvin K. ;
Burke, John E. ;
Garcia, K. Christopher ;
Grishin, Nick V. ;
Adams, Paul D. ;
Read, Randy J. ;
Baker, David .
SCIENCE, 2021, 373 (6557) :871-+
[10]  
Bergstra J, 2012, J MACH LEARN RES, V13, P281