A deep learning framework for predicting cyber attacks rates

被引:52
作者
Fang, Xing [1 ]
Xu, Maochao [2 ]
Xu, Shouhuai [3 ]
Zhao, Peng [4 ]
机构
[1] Illinois State Univ, Sch Informat Technol, Normal, IL 61761 USA
[2] Illinois State Univ, Dept Math, Normal, IL 61761 USA
[3] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[4] Jiangsu Normal Univ, Dept Comp Sci, Xuzhou 221110, Jiangsu, Peoples R China
关键词
ARIMA; GARCH; RNN; Hybrid models; LSTM; Deep learning; BRNN-LSTM; HYBRID ARIMA; MODEL;
D O I
10.1186/s13635-019-0090-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Like how useful weather forecasting is, the capability of forecasting or predicting cyber threats can never be overestimated. Previous investigations show that cyber attack data exhibits interesting phenomena, such as long-range dependence and high nonlinearity, which impose a particular challenge on modeling and predicting cyber attack rates. Deviating from the statistical approach that is utilized in the literature, in this paper we develop a deep learning framework by utilizing the bi-directional recurrent neural networks with long short-term memory, dubbed BRNN-LSTM. Empirical study shows that BRNN-LSTM achieves a significantly higher prediction accuracy when compared with the statistical approach.
引用
收藏
页数:11
相关论文
共 52 条
[1]   Characterization of Attackers' Activities in Honeypot Traffic Using Principal Component Analysis [J].
Almotairi, S. ;
Clark, A. ;
Mohay, G. ;
Zimmermann, J. .
2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, :147-154
[2]  
[Anonymous], ABS180906498 CORR
[3]  
[Anonymous], 2016, INTRO TIME SERIES FO
[4]  
[Anonymous], 2014, ARXIV14126980 CORR
[5]  
[Anonymous], ABS181208108 CORR
[6]  
[Anonymous], 2013, FOUND TRENDS SIGNAL, DOI DOI 10.1561/2000000039
[7]  
[Anonymous], 2017, ABS170505690 CORR
[8]  
[Anonymous], 2014, INTELLIGENT COMPUTIN, DOI DOI 10.1007/978-81-322-2012-1_26
[9]  
Baecher P, 2006, LECT NOTES COMPUT SC, V4219, P165
[10]  
Barabas M., 2011, 2011 IEEE International Conference on Intelligent Computer Communication and Processing, P95, DOI 10.1109/ICCP.2011.6047849