Proactive Cyber Defense

作者: Richard Colbaugh , Kristin Glass

DOI: 10.1016/B978-0-12-404702-0.00002-1

关键词:

摘要: There is great interest to develop proactive approaches cyber defense, in which future attack strategies are anticipated and these insights incorporated into defense designs. This chapter considers the problem of protecting computer networks against intrusions other disruptions a manner. We begin by leveraging coevolutionary relationship between attackers defenders derive two new filter-based methods for network defense. The first filters bipartite graph-based machine learning algorithm that enables information concerning previous attacks be “transferred” application novel attacks, thereby substantially increasing rate at systems can successfully respond attacks. second approach involves exploiting basic threat (obtained from, example, security analysts) generate “synthetic” data use appropriate actions, resulting defenses effective both current (near) utility demonstrated showing they outperform standard techniques task detecting malicious activity publicly available datasets. then consider anticipating characterizing impending events with sufficient specificity timeliness enable mitigating defensive actions taken, propose early warning method as solution this problem. based upon fact certain classes require coordinate their exploits signatures coordination provide warning. potential warning-based illustrated through case study involving politically motivated Internet

参考文章(18)
Daniel Lowd, Christopher Meek, Good Word Attacks on Statistical Spam Filters. conference on email and anti-spam. ,(2005)
Robert Tibshirani, Trevor Hastie, Jerome H. Friedman, The Elements of Statistical Learning ,(2001)
S.J. Yang, S.R. Byers, Real-time fusion and Projection of network intrusion activity international conference on information fusion. pp. 1- 8 ,(2008)
Nikolay V. Denishchenko, Pavel A Zelensky, Yuri V. Mashevsky, Yuri V. Namestnikov, Method and system for detection and prediction of computer virus-related epidemics ,(2010)
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker, Beyond heuristics: learning to classify vulnerabilities and predict exploits knowledge discovery and data mining. pp. 105- 114 ,(2010) , 10.1145/1835804.1835821
Kristin Glass, Richard Colbaugh, Web Analytics for Security Informatics european intelligence and security informatics conference. pp. 214- 219 ,(2011) , 10.1109/EISIC.2011.66
Kristin Glass, Richard Colbaugh, Max Planck, Automatically identifying the sources of large Internet events intelligence and security informatics. pp. 108- 113 ,(2010) , 10.1109/ISI.2010.5484766
Jingrui He, Yan Liu, Richard Lawrence, Graph-based transfer learning Proceeding of the 18th ACM conference on Information and knowledge management - CIKM '09. pp. 937- 946 ,(2009) , 10.1145/1645953.1646073
Jure Leskovec, Lars Backstrom, Jon Kleinberg, Meme-tracking and the dynamics of the news cycle Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '09. pp. 497- 506 ,(2009) , 10.1145/1557019.1557077