Temporal and Stochastic Modelling of Attacker Behaviour

被引:1
|
作者
Rade, Rahul [1 ]
Deshmukh, Soham [1 ]
Nene, Ruturaj [1 ]
Wadekar, Amey S. [1 ]
Unny, Ajay [1 ]
机构
[1] Veermata Jijabai Technol Inst, Mumbai, Maharashtra, India
来源
ADVANCES IN DATA SCIENCE | 2019年 / 941卷
关键词
Cyber security; Threat intelligence; Cowrie honeypot; Markov chain; Hidden Markov Models; Attacker behavioral analysis; Sequence modelling using LSTM;
D O I
10.1007/978-981-13-3582-2_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Threat Analysis is one of the emerging focus of information security. Its main functions include identifying the potential threats and predicting the nature of an attacker. Understanding the behaviour of an attacker remains one of the most important aspect of threat analysis, much work has been focused on the detection of concrete network attacks using Intrusion Detection System to raise an alert which subsequently requires human attention. However, we think inspecting the behavioural aspect of an attacker is more intuitive in order to take necessary security measures. In this paper, we propose a novel approach to analyse the behaviour of an attacker in cowrie honeypot. First, we introduce the concept of Honeypot and then model the data using semi-supervised Markov Chains and Hidden Markov Models. We evaluate the suggested methods on a dataset consisting of over a million simulated attacks on a cowrie honeypot system. Along with proposed stochastic models, we also explore the use of Long Short-Term Memory (LSTM) based model for attack sequence modelling. The LSTM based model was found to be better for modelling of long attack sequences as compared to Markov models due to their inability to capture long term dependencies. The results of these models are used to analyse different attack propagation and interaction patterns in the system and predict attacker's next action. These patterns can be used for a better understanding of the existing or evolving attacks and may also aid security experts to comprehend the mindset of an attacker.
引用
收藏
页码:30 / 45
页数:16
相关论文
共 50 条
  • [21] Modelling the stochastic dynamic behaviour of a pontoon bridge: A case study
    Kvale, Knut Andreas
    Sigbjornsson, Ragnar
    Oiseth, Ole
    COMPUTERS & STRUCTURES, 2016, 165 : 123 - 135
  • [22] Application of stochastic modelling for simulating hemp fibre peeling behaviour
    Guzman, L.
    Chen, Y.
    Potter, S.
    Zhong, W.
    Rahman, M.
    Canadian Biosystems Engineering / Le Genie des biosystems au Canada, 2013, 55 : 1 - 2
  • [23] RainSim: A spatial-temporal stochastic rainfall modelling system
    Burton, A.
    Kilsby, C. G.
    Fowler, H. J.
    Cowpertwait, P. S. P.
    O'Connell, P. E.
    ENVIRONMENTAL MODELLING & SOFTWARE, 2008, 23 (12) : 1356 - 1369
  • [24] Spatio-temporal stochastic modelling: environmental and health processes
    Mateu, J.
    Montes, F.
    Porcu, E.
    ENVIRONMETRICS, 2010, 21 (3-4) : 221 - 223
  • [25] Temporal and spatial simulation of the changes of land use by stochastic modelling
    Mari, Jean Francois
    Gobillot, Arnaud
    Benoit, Marc
    REVUE INTERNATIONALE DE GEOMATIQUE, 2018, 28 (02): : 219 - 242
  • [26] Spatial-temporal stochastic rainfall modelling for hydrological design
    Department of Statistical Science, University College London, Gower Street, London WC1E 6BT, United Kingdom
    不详
    IAHS-AISH Publ., 255 (225-235):
  • [27] Spatial-temporal stochastic rainfall modelling for hydrological design
    Northrop, PJ
    Chandler, RE
    Isham, VS
    Onof, C
    Wheater, HS
    HYDROLOGICAL EXTREMES: UNDERSTANDING, PREDICTING, MITIGATING, 1999, (255): : 225 - 235
  • [28] Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
    Benaissa, Nazim
    ABSTRACT STATE MACHINES, B AND Z, PROCEEDINGS, 2008, 5238 : 251 - 264
  • [29] Modelling Attacker with Deciding Security Properties by Induction and Deduction
    Kirsal-Ever, Yoney
    Eneh, Agozie
    Gemikonakli, Orhan
    Mostarda, Leonardo
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 1082 - 1087
  • [30] Modelling Evolving Voting Behaviour on Internet Platforms Stochastic Modelling Approaches for Dynamic Voting Systems
    Raje, Shikhar
    Singh, Navjyoti
    Mohan, Shobhit
    PROCEEDINGS OF THE 8TH INTERNATIONAL JOINT CONFERENCE ON COMPUTATIONAL INTELLIGENCE, VOL 1: ECTA, 2016, : 239 - 244