Predictive methods in cyber defense: Current experience and research challenges

被引:28
作者
Husak, Martin [1 ]
Bartos, Vaclav [2 ]
Sokol, Pavol [3 ]
Gajdos, Andrej [3 ]
机构
[1] Masaryk Univ, Inst Comp Sci, Brno, Czech Republic
[2] CESNET, Prague, Czech Republic
[3] Pavol Jozef Safarik Univ Kosice, Fac Sci, Kosice, Slovakia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2021年 / 115卷
关键词
Cybersecurity; Prediction; Forecasting; Data mining; Machine learning; Time series; INTERVALS;
D O I
10.1016/j.future.2020.10.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Predictive analysis allows next-generation cyber defense that is more proactive than current approaches based on intrusion detection. In this paper, we discuss various aspects of predictive methods in cyber defense and illustrate them on three examples of recent approaches. The first approach uses data mining to extract frequent attack scenarios and uses them to project ongoing cyberattacks. The second approach uses a dynamic network entity reputation score to predict malicious actors. The third approach uses time series analysis to forecast attack rates in the network. This paper presents a unique evaluation of the three distinct methods in a common environment of an intrusion detection alert sharing platform, which allows for a comparison of the approaches and illustrates the capabilities of predictive analysis for current and future research and cybersecurity operations. Our experiments show that all three methods achieved a sufficient technology readiness level for experimental deployment in an operational setting with promising accuracy and usability. Namely prediction and projection methods, despite their differences, are highly usable for predictive blacklisting, the first provides a more detailed output, and the second is more extensible. Network security situation forecasting is lightweight and displays very high accuracy, but does not provide details on predicted events. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:517 / 530
页数:14
相关论文
共 51 条
[1]  
Abdlhamed M., 2016, P INT C INT THINGS C
[2]  
Abdlhamed M, 2017, STUD COMPUT INTELL, V691, P155, DOI 10.1007/978-3-319-44257-0_7
[3]   Attack intention recognition: A review [J].
Ahmed A.A. ;
Zaman N.A.K. .
International Journal of Network Security, 2017, 19 (02) :244-250
[4]  
[Anonymous], **DATA OBJECT**, DOI DOI 10.17632/P6TYM3FGHZ.1
[5]  
Bartos V., 2019, P 14 INT C AV
[6]   Network entity characterization and attack prediction [J].
Bartos, Vaclav ;
Zadnik, Martin ;
Habib, Sheikh Mahbub ;
Vasilomanolakis, Emmanouil .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 :674-686
[7]  
Box G.E., 2015, TIME SERIES ANAL CON
[8]  
Brockwell P.J., 2016, INTRO TIME SERIES FO, DOI DOI 10.1007/978-3-319-29854-2
[9]  
CESNET, 2016, INTRUSION DETECTION
[10]   Predicting Cyber Threats with Virtual Security Products [J].
Chen, Shang-Tse ;
Han, Yufei ;
Chau, Duen Horng ;
Gates, Christopher ;
Hart, Michael ;
Roundy, Kevin A. .
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, :189-199