Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise?

07/31/2023
by   Breno Tostes, et al.
0

Indicators of Compromise (IOCs), such as IP addresses, file hashes, and domain names associated with known malware or attacks, are cornerstones of cybersecurity, serving to identify malicious activity on a network. In this work, we leverage real data to compare different parameterizations of IOC aging models. Our dataset comprises traffic at a real environment for more than 1 year. Among our trace-driven findings, we determine thresholds for the ratio between miss over monitoring costs such that the system benefits from storing IOCs for a finite time-to-live (TTL) before eviction. To the best of our knowledge, this is the first real world evaluation of thresholds related to IOC aging, paving the way towards realistic IOC decaying models.

READ FULL TEXT
research
10/10/2019

Would a File by Any Other Name Seem as Malicious?

Successful malware attacks on information technology systems can cause m...
research
03/15/2021

BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks

Amplification DDoS attacks inherently rely on IP spoofing to steer attac...
research
10/20/2021

Machine learning approaches to identify thresholds in a heat-health warning system context

During the last two decades, a number of countries or cities established...
research
11/24/2022

Network Security Modelling with Distributional Data

We investigate the detection of botnet command and control (C2) hosts in...
research
04/20/2021

On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware

Research and development of techniques which detect or remediate malicio...
research
05/04/2022

Early Detection of Spam Domains with Passive DNS and SPF

Spam domains are sources of unsolicited mails and one of the primary veh...

Please sign up or login with your details

Forgot password? Click here to reset