Malware in the Future? Forecasting Analyst Detection of Cyber Events

نویسندگان

  • Jonathan Z. Bakdash
  • Steve Hutchinson
  • Erin G. Zaroukian
  • Laura Marusich
  • Saravanan Thirumuruganathan
  • Char Sample
  • Blaine Hoffman
  • Gautam Das
چکیده

Cyber attacks endanger physical, economic, social, and political security. We use a Bayesian state space model to forecast the number of future cyber attacks. Cyber attacks were defined as malware detected by cyber analysts over seven years using cyber events (i.e., reports of malware attacks supported by evidence) at a large Computer Security Service Provider (CSSP). This CSSP protects a variety of computers and networks, which are critical infrastructure, for the U.S. Department of Defense and affiliated organizations. We find that cyber events from the previous week predict the number of events one week ahead. Unlike past work on predicting cyber attacks, our dataset was from an operational CSSP and based on analyst detection rather than logs or automated systems. Our finding of non-randomness in attacks is consistent with previous work reporting systematicity in attacks detected from logs and automated systems. Advanced information provided by a forecast may help with threat awareness for future cyber events similar to a weather forecast. Potential applications for cyber event forecasting include proactive allocation of resources and capabilities for cyber defense (e.g., analyst staffing and sensor configuration) in CSSPs. Consequently, enhanced threat awareness may improve cyber security by helping to optimize human and technical capabilities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning

In a corporate network, the situation awareness (SA) of a security analyst is of particular interest. A security analyst is in charge of observing the online operations of a corporate network (e.g., an online retail company with an external webserver and an internal fileserver) from threats of random or organized cyber-attacks. The current work describes a cognitive Instance-based Learning (IBL...

متن کامل

Cyber Attribution: An Argumentation-Based Approach

Attributing a cyber-operation through the use of multiple pieces of technical evidence (i.e., malware reverse-engineering and source tracking) and conventional intelligence sources (i.e., human or signals intelligence) is a difficult problem not only due to the effort required to obtain evidence, but the ease with which an adversary can plant false evidence. In this paper, we introduce a formal...

متن کامل

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

Poster: Using Semantic Snippets of Malware Traces for Efficient Behavioral Analysis

Given the myriad of new malware instances released each year, complete manual analysis is infeasible. However, it is important for a human analyst to document the behavior for future identification and for forensic investigations. On the bright side, many of the malware instances are slightly changed and recycled; this leads to substantial duplication. Current automated methods identify commona...

متن کامل

Detection and Modeling of Cyber Attacks with Petri Nets

The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1707.03243  شماره 

صفحات  -

تاریخ انتشار 2017