A Early Detection of Cyber Security Threats using Structured Behavior Modeling

نویسندگان

  • Xiaohua Yan
  • Joy Ying Zhang
چکیده

The rapid evolution of network intrusions has rendered traditional Intrusion Detection Systems (IDS) insufficient for cyber attacks such as the Advanced Persistent Threats (APT), which are sophisticated and enduring network intrusion campaigns comprising multiple imperceptible steps of malicious cyber activities. Dealing with such elaborated network intrusions calls for novel and more proactive defense methodologies. In this paper, we propose an effective early intrusion detection system called SID based on structured modeling of cyber attack behavior, which aims to discover the underlying high-level behavioral patterns within network traffic that are likely to be early signs of cyber attacks. Our system is capable of detecting cyber attacks in their early phases so that courses of defense actions can be made in advance of real compromises. Our experiments on the KDD99 dataset show that using high-level behavioral patterns for predicting cyber attacks achieves much better performance than that of using low-level analysis of network traffic, which is a standard approach in current IDS. F1 scores of more than 0.9 are reported for early detection of network attacks in the KDD99 dataset within windows of certain sizes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Situation Awareness: Modeling Detection of Cyber Attacks With Instance-Based Learning Theory

OBJECTIVE To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats. BACKGROUND Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use co...

متن کامل

Detection and Modeling of Cyber Attacks with Petri Nets

The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threa...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Modeling Abstraction Hierarchy Levels of the Cyber Attacks Using Random Process

Aspects of human behavior in cyber security allow more natural security to the user. This research focuses the appearance of anticipating cyber threats and their abstraction hierarchy levels on the mental picture levels of human. The study concerns the modeling of the behaviors of mental states of an individual under cyber attacks. The mental state of agents being not observable, we propose a n...

متن کامل

Cyber Situation Awareness: Rational Methods versus Instance-Based Learning Theory for Cyber Threat Detection

Cyber-attacks pose a grave threat to corporations and disrupt their normal functioning. The number of cyber attacks has been ever increasing and due to the loss of priceless information on account of these attacks there is an urgent necessity to check their prevalence. In this regard, the role of a security analyst, a human decision maker whose task is to accurately and timely detect cyber atta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013