Malware in the Future? Forecasting Analyst Detection of Cyber Events
نویسندگان
چکیده
Cyber attacks endanger physical, economic, social, and political security. We use a Bayesian state space model to forecast the number of future cyber attacks. Cyber attacks were defined as malware detected by cyber analysts over seven years using cyber events (i.e., reports of malware attacks supported by evidence) at a large Computer Security Service Provider (CSSP). This CSSP protects a variety of computers and networks, which are critical infrastructure, for the U.S. Department of Defense and affiliated organizations. We find that cyber events from the previous week predict the number of events one week ahead. Unlike past work on predicting cyber attacks, our dataset was from an operational CSSP and based on analyst detection rather than logs or automated systems. Our finding of non-randomness in attacks is consistent with previous work reporting systematicity in attacks detected from logs and automated systems. Advanced information provided by a forecast may help with threat awareness for future cyber events similar to a weather forecast. Potential applications for cyber event forecasting include proactive allocation of resources and capabilities for cyber defense (e.g., analyst staffing and sensor configuration) in CSSPs. Consequently, enhanced threat awareness may improve cyber security by helping to optimize human and technical capabilities.
منابع مشابه
Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning
In a corporate network, the situation awareness (SA) of a security analyst is of particular interest. A security analyst is in charge of observing the online operations of a corporate network (e.g., an online retail company with an external webserver and an internal fileserver) from threats of random or organized cyber-attacks. The current work describes a cognitive Instance-based Learning (IBL...
متن کاملCyber Attribution: An Argumentation-Based Approach
Attributing a cyber-operation through the use of multiple pieces of technical evidence (i.e., malware reverse-engineering and source tracking) and conventional intelligence sources (i.e., human or signals intelligence) is a difficult problem not only due to the effort required to obtain evidence, but the ease with which an adversary can plant false evidence. In this paper, we introduce a formal...
متن کاملA Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...
متن کاملPoster: Using Semantic Snippets of Malware Traces for Efficient Behavioral Analysis
Given the myriad of new malware instances released each year, complete manual analysis is infeasible. However, it is important for a human analyst to document the behavior for future identification and for forensic investigations. On the bright side, many of the malware instances are slightly changed and recycled; this leads to substantial duplication. Current automated methods identify commona...
متن کاملDetection and Modeling of Cyber Attacks with Petri Nets
The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1707.03243 شماره
صفحات -
تاریخ انتشار 2017