2019
DOI: 10.1186/s42400-019-0032-0
|View full text |Cite
|
Sign up to set email alerts
|

ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense

Abstract: The sophistication of cyberattacks penetrating into enterprise networks has called for predictive defense beyond intrusion detection, where different attack strategies can be analyzed and used to anticipate next malicious actions, especially the unusual ones. Unfortunately, traditional predictive analytics or machine learning techniques that require training data of known attack strategies are not practical, given the scarcity of representative data and the evolving nature of cyberattacks. This paper describes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 33 publications
0
10
0
Order By: Relevance
“…AhmetOkutan et al [7], proposed a model called ASSERT(attack synthesis and separation with entropy redistribution towards predictive cyber defence) which continuously analyse and separates models which shows cyber-attack behaviour. This model helps to overcome the problem of predictive defence beyond intrusion detection, where attackers will do malicious actions by analysing different attack strategies and finding their weakness'.…”
Section: Literature Reviewmentioning
confidence: 99%
“…AhmetOkutan et al [7], proposed a model called ASSERT(attack synthesis and separation with entropy redistribution towards predictive cyber defence) which continuously analyse and separates models which shows cyber-attack behaviour. This model helps to overcome the problem of predictive defence beyond intrusion detection, where attackers will do malicious actions by analysing different attack strategies and finding their weakness'.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Probably the best-known tools were proposed by MITRE [92], such as CyGraph [73]. Applied research and experimental deployment are becoming subject of research by other research groups as well [48,54,56,78,80].…”
Section: Publications On Csamentioning
confidence: 99%
“…Their research in this area includes the characterization of multi-stage cyber attacks [23,25] and the creation of a system for multi-stage attack emulation that fuses concepts from computer networks, system vulnerabilities, attack behaviors, and scenarios [70]. More recent works include generating attack models without a priori knowledge [78] and investigating the use of Generative Adversarial Networks to learn and generate synthetic alert scenarios [90].…”
Section: Research Groupsmentioning
confidence: 99%
“…A light-weight system that requires little expertise to configure, adapts to changing attack behaviors, and provides intuitive summary of intrusion activities is needed. Recognizing this technology gap, this work builds upon prior works [23], [24] to enhance and deploy ASSERT to consume intrusion alerts collected through a real-world SOC operation -OmniSOC at Inidiana University. The resulting system is a light-weight information theoretic unsupervised learning system that consumes streaming alerts and synthesizes statistical attack models in near real-time without prior knowledge.…”
Section: Introductionmentioning
confidence: 99%