• Complain

Aleroud Ahmed - Information Fusion for Cyber-Security Analytics

Here you can read online Aleroud Ahmed - Information Fusion for Cyber-Security Analytics full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Cham, year: 2017, publisher: Imprint: Springer, Springer International Publishing, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Aleroud Ahmed Information Fusion for Cyber-Security Analytics

Information Fusion for Cyber-Security Analytics: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Information Fusion for Cyber-Security Analytics" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Aleroud Ahmed: author's other books


Who wrote Information Fusion for Cyber-Security Analytics? Find out the surname, the name of the author of the book and a list of all author's works by series.

Information Fusion for Cyber-Security Analytics — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Information Fusion for Cyber-Security Analytics" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Springer International Publishing Switzerland 2017
Izzat M Alsmadi , George Karabatis and Ahmed Aleroud (eds.) Information Fusion for Cyber-Security Analytics Studies in Computational Intelligence 10.1007/978-3-319-44257-0_1
1. Using Contextual Information to Identify Cyber-Attacks
Ahmed AlEroud 1
(1)
Department of Computer Information Systems, Yarmouk University, Irbid, 21163, Jordan
(2)
Department of Information Systems, University of Maryland, Baltimore County (UMBC), 1000 Hilltop Circle, Baltimore, MD 21250, USA
Ahmed AlEroud (Corresponding author)
Email:
George Karabatis
Email:
Abstract
A recent trend is toward utilizing knowledge-based intrusion detection systems (IDSs). Knowledge-based IDSs store knowledge about cyber-attacks and possible vulnerabilities and use this knowledge to guide the process of attack prediction. Since an IDS contains information about these vulnerabilities, it can discover attempts to exploit them. One significant limitation of knowledge-based IDSs is the lack of contextual information used to detect attacks. Contextual information is not only information about the configuration on the targeted systems and their vulnerabilities. It also covers any relevant preconditions the attacks require to proceed successfully and the possible contextual semantic relationships between the activities of attackers in terms of time of these activities and the targeted locations. To overcome these limitations, we introduce a novel contextual framework which consists of several attack prediction models that can be utilized in conjunction with IDSs to detect cyber-attacks. We utilized extractable contextual elements from network data to create several knowledge-based, context-aware prediction models that are applied in conjunction with other intrusion detection techniques to assist in identifying known and unknown attacks. The created prediction models are utilized for several tasks including (1) expanding the predictions of other intrusion detection techniques using pre-identified contextual relationships between attacker activities, (2) filtering the nonrelevant predictions based on the situation of the hosts targeted by attacks, and (3) predicting the occurrence of unknown attacks. Our framework focuses on the significant dimensions in data; thus, it can be utilized to detect cyber-attacks while keeping the computational overhead as low as possible.
Keywords
Context Contextual information Cybersecurity IP flows Intrusion detection Semantics
An important challenge in cyber-attack detection is to develop learning methods that can integrate and fuse a much broader array of contextual information. Traditional statistical methods break down, because the broader the array of information, the more training examples are required to achieve good performance. We need to develop methods for breaking the learning problem up into modules that can be learned separately and then combined.
Thomas G. Dietterich
1.1 Significance of the Problem
Providing appropriate protection techniques is significant to combat cyber threats and preserve the integrity, confidentiality, and availability of information systems. The increasing volume of malicious cyber-attacks demands a collaborative effort between security professionals and researchers to design and develop effective cyber-defense systems. Cyber-attacks continue to rise worldwide in a manner that costs companies millions of dollars each year and leads to loss or misuse of information assets. Therefore, companies are under pressure to avoid the occurrence of these attacks or decrease the damage they cause to cyber systems.
There are various types of cyber-attacks, including infected Web pages, viruses, worms, spam botnets, and other unauthorized use of computer systems to modify or access data. Any computer system that does not have a proper security infrastructure can be compromised. Therefore, the cybersecurity authorities aim to design defensive security techniques to protect these systems. However, in spite of the increasing efforts in creating security countermeasures, new attack types arise on a regular basis. The reasons for these include programming errors, design flaws, insider threats, and inadequate security tools. Additionally, attackers keep evolving attack strategies, resulting in new attack variations being undetected at real time.
While it is theoretically possible to combat all types of cyber-attacks, most of the existing techniques provide reactive rather than proactive solutions to these attacks. The proactive techniques aim to eliminate the vulnerabilities in computer systems; however, avoiding all types of vulnerabilities is not possible in practice. Over the past decades, intrusion detection systems (IDSs) have been employed as one of the major reactive techniques against computer attacks. IDSs are an important component of defensive measures for protecting computer systems and networks from abuse. IDSs utilize logic operations, statistical techniques, and machine learning approaches to discern between different types of network activities.
Although modern IDSs are definitely useful and they keep on improving, they still generate a high amount of false alarms, fail to identify unknown attacks, and exhibit a low degree of reliability. Most of the existing IDSs depend on data analytics techniques that work on raw network data at a very low abstraction level to detect cyber-attacks.
1.1.1 Background
Safeguarding computer systems against attacks is one of the most challenging tasks that cannot be easily measured. Most security mechanisms can be breached due to unknown system vulnerabilities that exist and novel hacks applied by attackers to initiate an intrusion. The latter has been defined as any action the user of an information system takes when he/she is not legally allowed to [].
Systems with the capability of detecting intrusions are called intrusion detection systems (IDSs). The role of IDSs is to differentiate between intrusions and normal system execution. The existing intrusion detection techniques combat cyber-attacks at two levels of protection, the network level and the host level. The network-based IDSs monitor the features of network connections in order to detect cyber-attacks. Conversely, host-based IDSs monitor the status of workstations and the internals of a computing system using intrusion detection techniques to discover possible attacks at the host level. There have been also other classifications of IDSs [] is one of the most well-known signature-based intrusion detection systems. Snort performs real-time traffic analysis, content searching, and content matching to discover attacks using pre-identified attack signatures. While these systems are accurate in identifying known attacks, they cannot recognize new types of attacks. In anomaly-based IDSs, normal profiles are created and used by an anomaly detection technique to detect anomaly patterns that deviate from such profiles. The anomaly-based IDSs rely on statistical techniques to create normal profiles. Overall, the main advantage of these systems is their ability to detect unknown attacks that do not have existing signatures; however, their major limitation is the difficulty of accurately defining normal profiles. Intuitively, activities that deviate from normal profiles are not necessarily attacks. Failure to identify the boundaries of normal activity in network data leads to incorrect prediction of normal activities as attacks; thus, a high false positive rate is very possible. The hybrid-based IDSs combine signature-based and anomaly-based detection techniques to discover attacks. The major disadvantage of hybrid-based approaches is the computational overhead of using both signature matching and anomaly detection to analyze incoming network connections. Although IDSs have shown a good level of success in detecting intrusion attempts to networks, they show a visible deficiency in their effectiveness. Yet again, intrusion detection technologies have several research challenges that need to be addressed:
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Information Fusion for Cyber-Security Analytics»

Look at similar books to Information Fusion for Cyber-Security Analytics. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Information Fusion for Cyber-Security Analytics»

Discussion, reviews of the book Information Fusion for Cyber-Security Analytics and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.