Predicting Cyber Threats through Hacker Social Networks in Darkweb and Deepweb Forums

被引:16
作者
Almukaynizi, Mohammed [1 ]
Grimm, Alexander [1 ]
Nunes, Eric [1 ]
Shakarian, Jana [1 ]
Shakarian, Paulo [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85281 USA
来源
CSS 2017: THE 2017 INTERNATIONAL CONFERENCE OF THE COMPUTATIONAL SOCIAL SCIENCE SOCIETY OF THE AMERICAS | 2017年
关键词
D O I
10.1145/3145574.3145590
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We present an approach that combines social network analysis with machine learning techniques to predict future cyber threats through darkweb/deepweb discussions with hacking-related content. Our approach harnesses features derived from hacker social networks and from online sources of cybersecurity advisories. We address the problem of predicting the exploitability of software vulnerabilities to show that features computed from hacker social networks are important indicators of future cybersecurity incidents. We conduct a suite of experiments on real-world hacker and exploit data and demonstrate that social network data improves recall by about 19%, F1 score by about 6% while maintaining precision. We believe this is because social network structures related to certain exploit authors is indicative of their ability to write exploits that are subsequently employed in an attack.
引用
收藏
页数:7
相关论文
共 18 条
[1]   Comparing Vulnerability Severity and Exploits Using Case-Control Studies [J].
Allodi, Luca ;
Massacci, Fabio .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 17 (01)
[2]  
Benjamin V, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P85, DOI 10.1109/ISI.2015.7165944
[3]   Fraud Detection through Graph-Based User Behavior Modeling [J].
Beutel, Alex ;
Akoglu, Leman ;
Faloutsos, Christos .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1696-1697
[4]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[5]  
Bullough BenjaminL., 2017, P 2017 ACM INT WORKS, DOI DOI 10.1145/3041008.3041009
[6]  
Cao Q, 2012, 9 USENIX S NETW SYST, P197
[7]   Predicting Cyber Vulnerability Exploits with Machine Learning [J].
Edkrantz, Michel ;
Said, Alan .
THIRTEENTH SCANDINAVIAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (SCAI 2015), 2015, 278 :48-57
[8]  
Holt TJ, 2012, INT J CYBER CRIMINOL, V6, P891
[9]  
Motoyama M., P 2011 ACM SIGCOMM C, P71, DOI DOI 10.1145/2068816.2068824
[10]  
Nayak Kartik, 2014, Research in Attacks, Intrusions and Defenses, P426