Prototype Open-Source Software Stack for the Reduction of False Positives and Negatives in the Detection of Cyber Indicators of Compromise and Attack: Hybridized Log Analysis Corre

12/26/2020
by   stevechan, et al.
0

A prototypical solution stack (Solution Stack #1) with chosen Open-Source Software (OSS) components for an experiment was enhanced by hybridized OSS amalgams (e.g., Suricata and Sagan; Kubernetes, Nomad, Cloudify and Helios; MineMeld and Hector) and supplemented by select modified algorithms (e.g., modified N-Input Voting Algorithm [NIVA] modules and a modified Fault Tolerant Averaging Algorithm [FTAA] module) leveraged by ensemble method machine learning. The preliminary results of the prototype solution stack (Stack #2) indicate a reduction, with regards to cyber Indicators of Compromise (IOC) and indicators of attack (IOA), of false positives by approximately 15% and false negatives by approximately 47%.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/25/2020

Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires

Rapidly-changing cloud environments that consist of heavily interconnect...
research
10/01/2021

An analysis of open source software licensing questions in Stack Exchange sites

Free and open source software is widely used in the creation of software...
research
10/31/2019

Existence of Stack Overflow Vulnerabilities in Well-known Open Source Projects

A stack overflow occurs when a program or process tries to store more da...
research
02/25/2016

Loongson IoT Gateway: A Technical Review

A prototype of Loongson IoT (Internet of Things) ZigBee gateway is alrea...
research
04/05/2021

Predicting Crash Fault Residence via Simplified Deep Forest Based on A Reduced Feature Set

The software inevitably encounters the crash, which will take developers...
research
12/05/2017

FlagIt: A System for Minimally Supervised Human Trafficking Indicator Mining

In this paper, we describe and study the indicator mining problem in the...
research
10/27/2020

Generalized Insider Attack Detection Implementation using NetFlow Data

Insider Attack Detection in commercial networks is a critical problem th...

Please sign up or login with your details

Forgot password? Click here to reset