Threat Hunting System for Protecting Critical Infrastructures Using a Machine Learning Approach

被引:2
|
作者
Lozano, Mario Aragones [1 ]
Llopis, Israel Perez [1 ]
Domingo, Manuel Esteve [1 ]
机构
[1] Univ Politecn Valencia, Commun Dept, Valencia 46022, Spain
关键词
critical infrastructure protection; threat hunting; cyberattacks; artificial intelligence; machine learning; INTELLIGENCE;
D O I
10.3390/math11163448
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Cyberattacks are increasing in number and diversity in nature daily, and the tendency for them is to escalate dramatically in the forseeable future, with critical infrastructures (CI) assets and networks not being an exception to this trend. As time goes by, cyberattacks are more complex than before and unknown until they spawn, being very difficult to detect and remediate. To be reactive against those cyberattacks, usually defined as zero-day attacks, cyber-security specialists known as threat hunters must be in organizations' security departments. All the data generated by the organization's users must be processed by those threat hunters (which are mainly benign and repetitive and follow predictable patterns) in short periods to detect unusual behaviors. The application of artificial intelligence, specifically machine learning (ML) techniques (for instance NLP, C-RNN-GAN, or GNN), can remarkably impact the real-time analysis of those data and help to discriminate between harmless data and malicious data, but not every technique is helpful in every circumstance; as a consequence, those specialists must know which techniques fit the best at every specific moment. The main goal of the present work is to design a distributed and scalable system for threat hunting based on ML, and with a special focus on critical infrastructure needs and characteristics.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] A Hindi Question Answering System using Machine Learning Approach
    Nanda, Garima
    Dua, Mohit
    Singla, Krishma
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [42] Deciphering clinical abbreviations with a privacy protecting machine learning system
    Alvin Rajkomar
    Eric Loreaux
    Yuchen Liu
    Jonas Kemp
    Benny Li
    Ming-Jun Chen
    Yi Zhang
    Afroz Mohiuddin
    Juraj Gottweis
    Nature Communications, 13
  • [43] Deciphering clinical abbreviations with a privacy protecting machine learning system
    Rajkomar, Alvin
    Loreaux, Eric
    Liu, Yuchen
    Kemp, Jonas
    Li, Benny
    Chen, Ming-Jun
    Zhang, Yi
    Mohiuddin, Afroz
    Gottweis, Juraj
    NATURE COMMUNICATIONS, 2022, 13 (01)
  • [44] A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures
    Genge, Bela
    Kiss, Istvan
    Haller, Piroska
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 10 : 3 - 17
  • [45] A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Liu, Haoyuan
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 2705 - 2708
  • [46] Machine Learning Approach in Heterogeneous Group of Algorithms for Transport Safety-Critical System
    An, Jaehyung
    Mikhaylov, Alexey
    Kim, Keunwoo
    APPLIED SCIENCES-BASEL, 2020, 10 (08):
  • [47] A Machine Learning Approach for Quantifying the Design Error Propagation in Safety Critical Software System
    Bharathi, R.
    Selvarani, R.
    IETE JOURNAL OF RESEARCH, 2019, 68 (01) : 467 - 481
  • [48] Deep Dive into Hunting for LotLs Using Machine Learning and Feature Engineering
    Boros, Tiberiu
    Cotaie, Andrei
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, IOTBDS 2023, 2023, : 194 - 199
  • [49] Insider threat detection using supervised machine learning algorithms
    Manoharan, Phavithra
    Yin, Jiao
    Wang, Hua
    Zhang, Yanchun
    Ye, Wenjie
    TELECOMMUNICATION SYSTEMS, 2024, 87 (04) : 899 - 915
  • [50] SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach
    Teixeira, Marcio Andrey
    Salman, Tara
    Zolanvari, Maede
    Jain, Raj
    Meskin, Nader
    Samaka, Mohammed
    FUTURE INTERNET, 2018, 10 (08)