Cyber Key Terrain Identification Using Adjusted PageRank Centrality

06/19/2023
by   Lukáš Sadlek, et al.
0

The cyber terrain contains devices, network services, cyber personas, and other network entities involved in network operations. Designing a method that automatically identifies key network entities to network operations is challenging. However, such a method is essential for determining which cyber assets should the cyber defense focus on. In this paper, we propose an approach for the classification of IP addresses belonging to cyber key terrain according to their network position using the PageRank centrality computation adjusted by machine learning. We used hill climbing and random walk algorithms to distinguish PageRank's damping factors based on source and destination ports captured in IP flows. The one-time learning phase on a static data sample allows near-real-time stream-based classification of key hosts from IP flow data in operational conditions without maintaining a complete network graph. We evaluated the approach on a dataset from a cyber defense exercise and on data from the campus network. The results show that cyber key terrain identification using the adjusted computation of centrality is more precise than its original version.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/06/2019

Polymorphic Encryption and Pseudonymisation of IP Network Flows

We describe a system, PEP3, for storage and retrieval of IP flow informa...
research
06/21/2022

Identification of Attack Paths Using Kill Chain and Attack Graphs

The ever-evolving capabilities of cyber attackers force security adminis...
research
11/16/2017

An n-sided polygonal model to calculate the impact of cyber security events

This paper presents a model to represent graphically the impact of cyber...
research
01/18/2020

DynUnlock: Unlocking Scan Chains Obfuscated using Dynamic Keys

Outsourcing in semiconductor industry opened up venues for faster and co...
research
11/13/2021

Understanding and Assessment of Mission-Centric Key Cyber Terrains for joint Military Operations

Since the cyberspace consolidated as fifth warfare dimension, the differ...
research
03/05/2023

Prompt-Based Learning for Thread Structure Prediction in Cybersecurity Forums

With recent trends indicating cyber crimes increasing in both frequency ...
research
08/10/2020

Directional Laplacian Centrality for Cyber Situational Awareness

Cyber operations is drowning in diverse, high-volume, multi-source data....

Please sign up or login with your details

Forgot password? Click here to reset