Network entity characterization and attack prediction

被引:27
|
作者
Bartos, Vaclav [1 ]
Zadnik, Martin [2 ]
Habib, Sheikh Mahbub [3 ]
Vasilomanolakis, Emmanouil [4 ]
机构
[1] CESNET, Prague, Czech Republic
[2] CESNET, Czech Natl Res & Educ Network, Prague, Czech Republic
[3] Continental AG, Secur & Privacy Competence Ctr SCC, Hannover, Germany
[4] Aalborg Univ, Ctr Commun Media & Informat Technol, Aalborg, Denmark
基金
欧盟地平线“2020”;
关键词
Network security; Alert sharing; Reputation database; Attack prediction; Alert prioritization; Machine learning;
D O I
10.1016/j.future.2019.03.016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The devastating effects of cyber-attacks, highlight the need for novel attack detection and prevention techniques. Over the last years, considerable work has been done in the areas of attack detection as well as in collaborative defense. However, an analysis of the state of the art suggests that many challenges exist in prioritizing alert data and in studying the relation between a recently discovered attack and the probability of it occurring again. In this article, we propose a system that is intended for characterizing network entities and the likelihood that they will behave maliciously in the future. Our system, namely Network Entity Reputation Database System (NERDS), takes into account all the available information regarding a network entity (e. g. IP address) to calculate the probability that it will act maliciously. The latter part is achieved via the utilization of machine learning. Our experimental results show that it is indeed possible to precisely estimate the probability of future attacks from each entity using information about its previous malicious behavior and other characteristics. Ranking the entities by this probability has practical applications in alert prioritization, assembly of highly effective blacklists of a limited length and other use cases. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:674 / 686
页数:13
相关论文
共 50 条
  • [1] A network attack path prediction method using attack graph
    Liu, Xuguang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [2] Entity network prediction using multitype topic models
    Shiozaki, Hitohiro
    Eguchi, Koji
    Ohkawa, Takenao
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2008, 5012 : 705 - +
  • [3] A Boundary Offset Prediction Network for Named Entity Recognition
    Tang, Minghao
    He, Yongquan
    Xu, Yongxiu
    Xu, Hongbo
    Zhang, Wenyuan
    Lin, Yang
    FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (EMNLP 2023), 2023, : 14834 - 14846
  • [4] Entity Network Prediction Using Multitype Topic Models
    Shiozaki, Hitohiro
    Eguchi, Koji
    Ohkawa, Takenao
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (11) : 2589 - 2598
  • [5] A Method of Network Attack Named Entity Recognition based on Deep Active Learning
    Wang, Li
    Ma, Yunxiao
    Li, Mingyue
    Li, Hua
    Zhang, Peilong
    2024 IEEE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2024, : 376 - 387
  • [6] Network Attack Prediction With Hybrid Temporal Convolutional Network and Bidirectional GRU
    Bi, Jing
    Xu, Kangyuan
    Yuan, Haitao
    Zhang, Jia
    Zhou, Mengchu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12619 - 12630
  • [7] Network Attack Prediction Method Based on Threat Intelligence
    Wang, Junshe
    Yi, Yuzi
    Zhang, Hongbin
    Cao, Ning
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 151 - 160
  • [8] Attribute-Driven Capsule Network for Entity Relation Prediction
    Chen, Jiayin
    Gong, Xiaolong
    Chen, Xi
    Ma, Zhiyi
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2020, PT I, 2020, 12084 : 675 - 686
  • [9] Lightweight Machine Learning Prediction Algorithm for Network Attack on Software Defined Network
    Ibrahimy, Arya Maulana
    Dewanta, Favian
    Aminanto, Muhammad Erza
    2022 IEEE ASIA PACIFIC CONFERENCE ON WIRELESS AND MOBILE (APWIMOB), 2022, : 55 - 60
  • [10] Network attack prediction method based on threat intelligence for IoT
    Hongbin Zhang
    Yuzi Yi
    Junshe Wang
    Ning Cao
    Qiang Duan
    Multimedia Tools and Applications, 2019, 78 : 30257 - 30270