Attributing Hacks
نویسندگان
چکیده
In this paper, we describe an algorithm for estimating the provenance of hacks on websites. That is, given properties of sites and the temporal occurrence of attacks, we are able to attribute individual attacks to joint causes and vulnerabilities, as well as estimating the evolution of these vulnerabilities over time. Specifically, we use hazard regression with a time-varying additive hazard function parameterized in a generalized linear form. The activation coefficients on each feature are continuous-time functions over time. We formulate the problem of learning these functions as a constrained variational maximum likelihood estimation problem with total variation penalty and show that the optimal solution is a 0th order spline (a piecewise constant function) with a finite number of adaptively chosen knots. This allows the inference problem to be solved efficiently and at scale by solving a finite dimensional optimization problem. Extensive experiments on real data sets show that our method significantly outperforms Cox’s proportional hazard model. We also conduct case studies and verify that the fitted functions are indeed recovering vulnerable features.
منابع مشابه
Home theater hacks - 100 industrial-strength tips and tools
Book of 5521 home theater hacks 100 industrial strength tips and tools it is completely with regards books. Right here is where a little smarts can be found in 5521 home theater hacks 100 industrial strength tips and tools. why should not it, as it beats various other with a headcount of million user guides as well as handbooks. Those useful soft protected sheaf is of paper with multilingual gu...
متن کاملOnline investing hacks - 100 industrial-strength tips and tools
online investing hacks 100 industrial strength tips tools online investing hacks 100 industrial strength tips and tools online investing hacks 100 industrial strength tips tools online investing hacks 100 industrial strength tips and tools online investing hacks: 100 industrial-strength tips & tools digital photography hacks 100 industrial strength tips and digital photography hacks 100 industr...
متن کاملA new type of intrinsic two-way shape-memory effect in hacks of NiTi-wires
Shape-memory hacks were fabricated in a single processing step ("one-time procedure") by a combination of tensile and bending deformation of a martensitic NiTi-wire. The hacks reversibly changed curvature on heating and cooling in a reproducible manner over 50 thermal cycles. This new type of intrinsic two-way shape memory effect was studied by subjecting the hacks to a beam of high-energy sync...
متن کاملDo-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times
In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, 'hacking' is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey's experimental approach...
متن کاملLinux server hacks - 100 industrial-strength tips and tools
Where you can find the linux server hacks 100 industrial strength tips and tools easily? Is it in the book store? Online book store? are you sure? Keep in mind that you will find the book in this site. This book is very referred for you because it gives not only the experience but also lesson. The lessons are very valuable to serve for you, that's not about who are reading this linux server hac...
متن کامل