A deep learning framework for predicting cyber attacks rates

被引:0
作者
Xing Fang
Maochao Xu
Shouhuai Xu
Peng Zhao
机构
[1] School of Information Technology,Department of Mathematics
[2] Illinois State University,Department of Computer Science
[3] Illinois State University,Department of Computer Science
[4] University of Texas at San Antonio,undefined
[5] Jiangsu Normal University,undefined
来源
EURASIP Journal on Information Security | / 2019卷
关键词
ARIMA; GARCH; RNN; Hybrid models; LSTM; Deep learning; BRNN-LSTM;
D O I
暂无
中图分类号
学科分类号
摘要
Like how useful weather forecasting is, the capability of forecasting or predicting cyber threats can never be overestimated. Previous investigations show that cyber attack data exhibits interesting phenomena, such as long-range dependence and high nonlinearity, which impose a particular challenge on modeling and predicting cyber attack rates. Deviating from the statistical approach that is utilized in the literature, in this paper we develop a deep learning framework by utilizing the bi-directional recurrent neural networks with long short-term memory, dubbed BRNN-LSTM. Empirical study shows that BRNN-LSTM achieves a significantly higher prediction accuracy when compared with the statistical approach.
引用
收藏
相关论文
共 69 条
  • [1] Zhan Z.(2013)Characterizing honeypot-captured cyber attacks: Statistical framework and case study IEEE Trans. Inf. Forensic Secur. 8 1775-1789
  • [2] Xu M.(2014)Computational techniques for predicting cyber threats Intell. Comput. Commun. Devices Proc ICCD 2014 1 247-1677
  • [3] Xu S.(2015)Predicting cyber attack rates with extreme values IEEE Trans. Inf. Forensic Secur. 10 1666-2563
  • [4] Gandotra E.(2017)Modeling and predicting extreme cyber attack rates via marked point processes J. Appl. Stat. 44 2534-520
  • [5] Bansal D.(2017)A vine copula model for predicting the effectiveness of cyber defense early-warning Technometrics 59 508-2740
  • [6] Sofat S.(2018)Modeling multivariate cybersecurity risks J. Appl. Stat. 45 2718-660
  • [7] Zhan Z.(2019)Survey of attack projection, prediction, and forecasting in cyber security IEEE Commun. Surv. Tutor. 21 640-232
  • [8] Xu M.(1987)An intrusion-detection model IEEE Trans. Softw. Eng. SE-13 222-2497
  • [9] Xu S.(2003)Novelty detection: a review part 1: statistical approaches Sig. Process 83 2481-414
  • [10] Peng C.(2009)Anomaly detection: a survey ACM Comput. Surv. (CSUR) 41 15-387