ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
Abstract The sophistication of cyberattacks penetrating into enterprise networks has called for predictive defense beyond intrusion detection, where different attack strategies can be analyzed and used to anticipate next malicious actions, especially the unusual ones. Unfortunately, traditional pred...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2019-05-01
|
Series: | Cybersecurity |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s42400-019-0032-0 |
id |
doaj-d098d8ffbe9940698660eb1da3192883 |
---|---|
record_format |
Article |
spelling |
doaj-d098d8ffbe9940698660eb1da31928832020-11-25T02:15:00ZengSpringerOpenCybersecurity2523-32462019-05-012111810.1186/s42400-019-0032-0ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defenseAhmet Okutan0Shanchieh Jay Yang1Computer Engineering, Rochester Institute of TechnologyComputer Engineering, Rochester Institute of TechnologyAbstract The sophistication of cyberattacks penetrating into enterprise networks has called for predictive defense beyond intrusion detection, where different attack strategies can be analyzed and used to anticipate next malicious actions, especially the unusual ones. Unfortunately, traditional predictive analytics or machine learning techniques that require training data of known attack strategies are not practical, given the scarcity of representative data and the evolving nature of cyberattacks. This paper describes the design and evaluation of a novel automated system, ASSERT, which continuously synthesizes and separates cyberattack behavior models to enable better prediction of future actions. It takes streaming malicious event evidences as inputs, abstracts them to edge-based behavior aggregates, and associates the edges to attack models, where each represents a unique and collective attack behavior. It follows a dynamic Bayesian-based model generation approach to determine when a new attack behavior is present, and creates new attack models by maximizing a cluster validity index. ASSERT generates empirical attack models by separating evidences and use the generated models to predict unseen future incidents. It continuously evaluates the quality of the model separation and triggers a re-clustering process when needed. Through the use of 2017 National Collegiate Penetration Testing Competition data, this work demonstrates the effectiveness of ASSERT in terms of the quality of the generated empirical models and the predictability of future actions using the models.http://link.springer.com/article/10.1186/s42400-019-0032-0Cyber securityDynamic bayesian classifierClustering KL divergence |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ahmet Okutan Shanchieh Jay Yang |
spellingShingle |
Ahmet Okutan Shanchieh Jay Yang ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense Cybersecurity Cyber security Dynamic bayesian classifier Clustering KL divergence |
author_facet |
Ahmet Okutan Shanchieh Jay Yang |
author_sort |
Ahmet Okutan |
title |
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense |
title_short |
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense |
title_full |
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense |
title_fullStr |
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense |
title_full_unstemmed |
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense |
title_sort |
assert: attack synthesis and separation with entropy redistribution towards predictive cyber defense |
publisher |
SpringerOpen |
series |
Cybersecurity |
issn |
2523-3246 |
publishDate |
2019-05-01 |
description |
Abstract The sophistication of cyberattacks penetrating into enterprise networks has called for predictive defense beyond intrusion detection, where different attack strategies can be analyzed and used to anticipate next malicious actions, especially the unusual ones. Unfortunately, traditional predictive analytics or machine learning techniques that require training data of known attack strategies are not practical, given the scarcity of representative data and the evolving nature of cyberattacks. This paper describes the design and evaluation of a novel automated system, ASSERT, which continuously synthesizes and separates cyberattack behavior models to enable better prediction of future actions. It takes streaming malicious event evidences as inputs, abstracts them to edge-based behavior aggregates, and associates the edges to attack models, where each represents a unique and collective attack behavior. It follows a dynamic Bayesian-based model generation approach to determine when a new attack behavior is present, and creates new attack models by maximizing a cluster validity index. ASSERT generates empirical attack models by separating evidences and use the generated models to predict unseen future incidents. It continuously evaluates the quality of the model separation and triggers a re-clustering process when needed. Through the use of 2017 National Collegiate Penetration Testing Competition data, this work demonstrates the effectiveness of ASSERT in terms of the quality of the generated empirical models and the predictability of future actions using the models. |
topic |
Cyber security Dynamic bayesian classifier Clustering KL divergence |
url |
http://link.springer.com/article/10.1186/s42400-019-0032-0 |
work_keys_str_mv |
AT ahmetokutan assertattacksynthesisandseparationwithentropyredistributiontowardspredictivecyberdefense AT shanchiehjayyang assertattacksynthesisandseparationwithentropyredistributiontowardspredictivecyberdefense |
_version_ |
1724898525324509184 |