skip to main content
10.1145/2713579.2713582acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities

Authors Info & Claims
Published:04 March 2015Publication History

ABSTRACT

This study offers a first step toward understanding the extent to which we may be able to predict cyber security incidents (which can be of one of many types) by applying machine learning techniques and using externally observed malicious activities associated with network entities, including spamming, phishing, and scanning, each of which may or may not have direct bearing on a specific attack mechanism or incident type. Our hypothesis is that when viewed collectively, malicious activities originating from a network are indicative of the general cleanness of a network and how well it is run, and that furthermore, collectively they exhibit fairly stable and thus predictive behavior over time. To test this hypothesis, we utilize two datasets in this study: (1) a collection of commonly used IP address-based/host reputation blacklists (RBLs) collected over more than a year, and (2) a set of security incident reports collected over roughly the same period. Specifically, we first aggregate the RBL data at a prefix level and then introduce a set of features that capture the dynamics of this aggregated temporal process. A comparison between the distribution of these feature values taken from the incident dataset and from the general population of prefixes shows distinct differences, suggesting their value in distinguishing between the two while also highlighting the importance of capturing dynamic behavior (second order statistics) in the malicious activities. These features are then used to train a support vector machine (SVM) for prediction. Our preliminary results show that we can achieve reasonably good prediction performance over a forecasting window of a few months.

References

  1. Barracuda Reputation Blocklist. http://www.barracudacentral.org/.Google ScholarGoogle Scholar
  2. Composite Blocking List. http://cbl.abuseat.org/.Google ScholarGoogle Scholar
  3. DShield. http://www.dshield.org/.Google ScholarGoogle Scholar
  4. Global Security Reports. http://globalsecuritymap.com/.Google ScholarGoogle Scholar
  5. Global Spamming Rank. http://www.spamrankings.net/.Google ScholarGoogle Scholar
  6. hpHosts for your pretection. http://hosts-file.net/.Google ScholarGoogle Scholar
  7. OpenBL. http://www.openbl.org/.Google ScholarGoogle Scholar
  8. PhishTank. http://www.phishtank.com/.Google ScholarGoogle Scholar
  9. SpamCop Blocking List. http://www.spamcop.net/.Google ScholarGoogle Scholar
  10. SURBL: URL REPUTATION DATA. http://www.surbl.org/.Google ScholarGoogle Scholar
  11. The SPAMHAUS project: SBL, XBL, PBL, ZEN Lists. http://www.spamhaus.org/.Google ScholarGoogle Scholar
  12. UCEPROTECTOR Network. http://www.uceprotect.net/.Google ScholarGoogle Scholar
  13. Web Hacking Incidence Reports. http://hackmageddon.com/.Google ScholarGoogle Scholar
  14. WPBL: Weighted Private Block List. http://www.wpbl.info/.Google ScholarGoogle Scholar
  15. Bishop, C. M., et al. Pattern Recognition and Machine Learning, vol. 1. springer New York.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Deng, R., Yang, Z., Chen, J., and Chow, M.-Y. Load Scheduling With Price Uncertainty and Temporally-Coupled Constraints in Smart Grids.Google ScholarGoogle Scholar
  17. Xie, Y., Yu, F., Achan, K., Gillum, E., Goldszmidt, M., and Wobber, T. How Dynamic Are IP Addresses? In Proceedings of SIGCOMM (New York, NY, USA, 2007), ACM, pp. 301--312. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IWSPA '15: Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics
        March 2015
        64 pages
        ISBN:9781450333412
        DOI:10.1145/2713579

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 March 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        IWSPA '15 Paper Acceptance Rate4of13submissions,31%Overall Acceptance Rate18of58submissions,31%

        Upcoming Conference

        CODASPY '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader