Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243811
|View full text |Cite
|
Sign up to set email alerts
|

Tiresias

Abstract: With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However this is still an open research problem, and previous research in predicting malicious events only looked at binary outcomes (e.g., whether an attack would happen or not), but not at the specific steps that an attacker would undertake. To fill this gap we present Ti… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 97 publications
(18 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…CNNs are a type of neural network first designed for 2-dimensional convolutions as inspired by the biological processes of animals' visual cortex [28]. They are primarily used for image classification, but in recent years, they have proven to be a powerful tool in security applications [29], [30]. CNNs are similar to ordinary neural networks (e.g., MLP): they consist of a number of layers where each layer is made up of neurons.…”
Section: ) Convolutional Neural Network (Cnn)mentioning
confidence: 99%
See 1 more Smart Citation
“…CNNs are a type of neural network first designed for 2-dimensional convolutions as inspired by the biological processes of animals' visual cortex [28]. They are primarily used for image classification, but in recent years, they have proven to be a powerful tool in security applications [29], [30]. CNNs are similar to ordinary neural networks (e.g., MLP): they consist of a number of layers where each layer is made up of neurons.…”
Section: ) Convolutional Neural Network (Cnn)mentioning
confidence: 99%
“…Based on the results, we use 400 trees with no limit to the tree depth. c) Multilayer Perceptron: When considering scenarios with 50 features, we investigate [relu, tanh] activation functions and the following number of hidden layers [1,2,3,4,5] and a number of neurons [10,20,25,30,40,50].…”
Section: E Hyper-parameter Tuningmentioning
confidence: 99%
“…Previous researches about intrusion prediction 15,16 have proven that prediction of attackers' behavior is possible because all network attack behaviors follow the law of Cyber Kill Chain 17 . The result of intrusion prediction changes based on how we define the attack behavior.…”
Section: Game Model Based On Honeynet and Intrusion Predictionmentioning
confidence: 99%
“…Sequence approaches such as [14,3,27,28,2] take log entries and concatenate them chronologically into sequences. These techniques are primarily concerned with capturing temporal and sequential connections between log entries, and often make use of deep learning techniques such as Long Short-Term Memory (LSTM) or machine learning tool such as signature kernel, to learn from previous events and forecast future events.…”
Section: Related Workmentioning
confidence: 99%