ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense

Abstract The sophistication of cyberattacks penetrating into enterprise networks has called for predictive defense beyond intrusion detection, where different attack strategies can be analyzed and used to anticipate next malicious actions, especially the unusual ones. Unfortunately, traditional pred...

Full description

Bibliographic Details
Main Authors: Ahmet Okutan, Shanchieh Jay Yang
Format: Article
Language:English
Published: SpringerOpen 2019-05-01
Series:Cybersecurity
Subjects:
Online Access:http://link.springer.com/article/10.1186/s42400-019-0032-0
id doaj-d098d8ffbe9940698660eb1da3192883
record_format Article
spelling doaj-d098d8ffbe9940698660eb1da31928832020-11-25T02:15:00ZengSpringerOpenCybersecurity2523-32462019-05-012111810.1186/s42400-019-0032-0ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defenseAhmet Okutan0Shanchieh Jay Yang1Computer Engineering, Rochester Institute of TechnologyComputer Engineering, Rochester Institute of TechnologyAbstract The sophistication of cyberattacks penetrating into enterprise networks has called for predictive defense beyond intrusion detection, where different attack strategies can be analyzed and used to anticipate next malicious actions, especially the unusual ones. Unfortunately, traditional predictive analytics or machine learning techniques that require training data of known attack strategies are not practical, given the scarcity of representative data and the evolving nature of cyberattacks. This paper describes the design and evaluation of a novel automated system, ASSERT, which continuously synthesizes and separates cyberattack behavior models to enable better prediction of future actions. It takes streaming malicious event evidences as inputs, abstracts them to edge-based behavior aggregates, and associates the edges to attack models, where each represents a unique and collective attack behavior. It follows a dynamic Bayesian-based model generation approach to determine when a new attack behavior is present, and creates new attack models by maximizing a cluster validity index. ASSERT generates empirical attack models by separating evidences and use the generated models to predict unseen future incidents. It continuously evaluates the quality of the model separation and triggers a re-clustering process when needed. Through the use of 2017 National Collegiate Penetration Testing Competition data, this work demonstrates the effectiveness of ASSERT in terms of the quality of the generated empirical models and the predictability of future actions using the models.http://link.springer.com/article/10.1186/s42400-019-0032-0Cyber securityDynamic bayesian classifierClustering KL divergence
collection DOAJ
language English
format Article
sources DOAJ
author Ahmet Okutan
Shanchieh Jay Yang
spellingShingle Ahmet Okutan
Shanchieh Jay Yang
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
Cybersecurity
Cyber security
Dynamic bayesian classifier
Clustering KL divergence
author_facet Ahmet Okutan
Shanchieh Jay Yang
author_sort Ahmet Okutan
title ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
title_short ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
title_full ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
title_fullStr ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
title_full_unstemmed ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
title_sort assert: attack synthesis and separation with entropy redistribution towards predictive cyber defense
publisher SpringerOpen
series Cybersecurity
issn 2523-3246
publishDate 2019-05-01
description Abstract The sophistication of cyberattacks penetrating into enterprise networks has called for predictive defense beyond intrusion detection, where different attack strategies can be analyzed and used to anticipate next malicious actions, especially the unusual ones. Unfortunately, traditional predictive analytics or machine learning techniques that require training data of known attack strategies are not practical, given the scarcity of representative data and the evolving nature of cyberattacks. This paper describes the design and evaluation of a novel automated system, ASSERT, which continuously synthesizes and separates cyberattack behavior models to enable better prediction of future actions. It takes streaming malicious event evidences as inputs, abstracts them to edge-based behavior aggregates, and associates the edges to attack models, where each represents a unique and collective attack behavior. It follows a dynamic Bayesian-based model generation approach to determine when a new attack behavior is present, and creates new attack models by maximizing a cluster validity index. ASSERT generates empirical attack models by separating evidences and use the generated models to predict unseen future incidents. It continuously evaluates the quality of the model separation and triggers a re-clustering process when needed. Through the use of 2017 National Collegiate Penetration Testing Competition data, this work demonstrates the effectiveness of ASSERT in terms of the quality of the generated empirical models and the predictability of future actions using the models.
topic Cyber security
Dynamic bayesian classifier
Clustering KL divergence
url http://link.springer.com/article/10.1186/s42400-019-0032-0
work_keys_str_mv AT ahmetokutan assertattacksynthesisandseparationwithentropyredistributiontowardspredictivecyberdefense
AT shanchiehjayyang assertattacksynthesisandseparationwithentropyredistributiontowardspredictivecyberdefense
_version_ 1724898525324509184