Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics 2015
DOI: 10.1145/2713579.2713582
|View full text |Cite
|
Sign up to set email alerts
|

Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities

Abstract: This study offers a first step toward understanding the extent to which we may be able to predict cyber security incidents (which can be of one of many types) by applying machine learning techniques and using externally observed malicious activities associated with network entities, including spamming, phishing, and scanning, each of which may or may not have direct bearing on a specific attack mechanism or incident type. Our hypothesis is that when viewed collectively, malicious activities originating from a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0
2

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(31 citation statements)
references
References 2 publications
0
29
0
2
Order By: Relevance
“…Zhang et al find that mismanagement of networks correlates with malicious behavior (measured using a quantity similar to our wickedness) in Autonomous Systems [82], but do not focus on how this behavior might evolve over time. Liu et al use support vector machines trained on data from reputation blacklists to predict security incidents [46]. These predictions could be incorporated into our model to better predict some of the large changes in wickedness over time.…”
Section: Related Workmentioning
confidence: 99%
“…Zhang et al find that mismanagement of networks correlates with malicious behavior (measured using a quantity similar to our wickedness) in Autonomous Systems [82], but do not focus on how this behavior might evolve over time. Liu et al use support vector machines trained on data from reputation blacklists to predict security incidents [46]. These predictions could be incorporated into our model to better predict some of the large changes in wickedness over time.…”
Section: Related Workmentioning
confidence: 99%
“…Similar to that work, we have an internal view of enterprise security, but our study analyzes a time frame that is eight times longer and covers 28K enterprises across 67 industries. Other related works have studied the network hygiene and security posture of enterprises using an outside-in view based on Internet-wide scans and blacklists [16], [27], [28], [50]. The limitations of an outside-in view is that it only applies to externally reachable servers or is based on coarse-grained blacklists.…”
Section: Introductionmentioning
confidence: 99%
“…2. Cyber attack prediction using social media data: There have been several attempts to use external social media data sources to predict real world cyber attacks [1,23,13,22]. However, the problem these studies focus on is to build predictive models to correlate the social media signals to attacks in the real world that are not observed for a specific organization.…”
Section: Related Work and Motivationmentioning
confidence: 99%