A selective ensemble model for cognitive cybersecurity analysis

被引:11
作者
Jiang, Yuning [1 ]
Atif, Yacine [1 ]
机构
[1] Univ Skovde, Sch Informat, Skovde, Sweden
关键词
Information security; Vulnerability analysis; Data correlation; Machine learning; Ensemble; Data mining; Database management; SCORING SYSTEM; TEXT; VULNERABILITIES; INFORMATION;
D O I
10.1016/j.jnca.2021.103210
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic data-driven vulnerability assessments face massive heterogeneous data contained in, and produced by SOCs (Security Operations Centres). Manual vulnerability assessment practices result in inaccurate data and induce complex analytical reasoning. Contemporary security repositories' diversity, incompleteness and redundancy contribute to such security concerns. These issues are typical characteristics of public and manufacturer vulnerability reports, which exacerbate direct analysis to root out security deficiencies. Recent advances in machine learning techniques promise novel approaches to overcome these notorious diversity and incompleteness issues across massively increasing vulnerability reports corpora. Yet, these techniques themselves exhibit varying degrees of performance as a result of their diverse methods. We propose a cognitive cybersecurity approach that empowers human cognitive capital along two dimensions. We first resolve conflicting vulnerability reports and preprocess embedded security indicators into reliable data sets. Then, we use these data sets as a base for our proposed ensemble meta-classifier methods that fuse machine learning techniques to improve the predictive accuracy over individual machine learning algorithms. The application and implication of this methodology in the context of vulnerability analysis of computer systems are yet to unfold the full extent of its potential. The proposed cognitive security methodology in this paper is shown to improve performances when addressing the above-mentioned incompleteness and diversity issues across cybersecurity alert repositories. The experimental analysis conducted on actual cybersecurity data sources reveals interesting tradeoffs of our proposed selective ensemble methodology, to infer patterns of computer system vulnerabilities.
引用
收藏
页数:16
相关论文
共 78 条
[1]   Comparing Vulnerability Severity and Exploits Using Case-Control Studies [J].
Allodi, Luca ;
Massacci, Fabio .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 17 (01)
[2]  
Almukaynizi Mohammed, 2017, 2017 International Conference on Cyber-Conflict (CyCon U.S.), P82, DOI 10.1109/CYCONUS.2017.8167501
[3]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[4]  
Aly M., 2005, NEURAL NETWORKS, V19, P1
[5]   Cognitive security: A comprehensive study of cognitive science in cybersecurity [J].
Andrade, Roberto O. ;
Yoo, Sang Guun .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48
[6]   Vulnus: Visual Vulnerability Analysis for Network Security [J].
Angelini, Marco ;
Blasilli, Graziano ;
Catarci, Tiziana ;
Lenti, Simone ;
Santucci, Giuseppe .
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2019, 25 (01) :183-192
[7]  
[Anonymous], 2011, International Conference on Database and Expert Systems Applications
[8]  
[Anonymous], 2016, P INT C BROADBAND WI
[9]  
Anwar A., 2020, ARXIV PREPRINT ARXIV
[10]   The Operational Role of Security Information and Event Management Systems [J].
Bhatt, Sandeep ;
Manadhata, Pratyusa K. ;
Zomlot, Loai .
IEEE SECURITY & PRIVACY, 2014, 12 (05) :35-41