Probabilistic Modeling and Inference for Obfuscated Cyber Attack Sequences

09/05/2018
by   Haitao Du, et al.
0

A key element in defending computer networks is to recognize the types of cyber attacks based on the observed malicious activities. Obfuscation onto what could have been observed of an attack sequence may lead to mis-interpretation of its effect and intent, leading to ineffective defense or recovery deployments. This work develops probabilistic graphical models to generalize a few obfuscation techniques and to enable analyses of the Expected Classification Accuracy (ECA) as a result of these different obfuscation on various attack models. Determining the ECA is a NP-Hard problem due to the combinatorial number of possibilities. This paper presents several polynomial-time algorithms to find the theoretically bounded approximation of ECA under different attack obfuscation models. Comprehensive simulation shows the impact on ECA due to alteration, insertion and removal of attack action sequence, with increasing observation length, level of obfuscation and model complexity.

READ FULL TEXT

page 8

page 12

research
01/05/2021

Analyzing Cyber-Attack Intention for Digital Forensics Using Case-Based Reasoning

Cyber-attacks are increasing and varying dramatically day by day. It has...
research
01/16/2023

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense

Deep Learning backdoor attacks have a threat model similar to traditiona...
research
02/01/2022

Predicting Cyber-Attack using Cyber Situational Awareness: The Case of Independent Power Producers (IPPs)

The increasing critical dependencies on Internetof-Things (IoT) have rai...
research
02/18/2020

Framework to Describe Intentions of a Cyber Attack Action

The techniques and tactics used by cyber adversaries are becoming more s...
research
12/10/2019

Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques

Machine learning techniques help to understand patterns of a dataset to ...
research
03/26/2018

Forecasting Cyber Attacks with Imbalanced Data Sets and Different Time Granularities

If cyber incidents are predicted a reasonable amount of time before they...
research
02/13/2018

Probabilistic Warnings in National Security Crises: Pearl Harbor Revisited

Imagine a situation where a group of adversaries is preparing an attack ...

Please sign up or login with your details

Forgot password? Click here to reset