2023
DOI: 10.1038/s41598-023-35198-1
|View full text |Cite
|
Sign up to set email alerts
|

A holistic and proactive approach to forecasting cyber threats

Abstract: Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-matching algorithms help human experts to scan system logs and network traffic for known virus or malware signatures. Recent research has introduced effective Machine Learning (ML) models for cyber-attack detection, promising to automate the task of detecting, tracking and blocking malware and intruders. Much less effort has been devoted to cyber-attack prediction, especially beyond the short-term time scale of hours … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…Additionally, attackers employ various strategies to evade detection, resulting in diverse patterns and temporal distributions in terms of their attack behavior. For instance, some attacks may occur during nonworking hours, or attackers might intentionally carry out attacks during holidays when network traffic is typically more congested, making it easier to conceal their malicious activities [47,48]. Therefore, network intrusion detection needs to consider the temporal dependencies before and after attack events to gain a comprehensive understanding of intrusion behavior patterns.…”
Section: Bidirectional Long Short-term Memorymentioning
confidence: 99%
“…Additionally, attackers employ various strategies to evade detection, resulting in diverse patterns and temporal distributions in terms of their attack behavior. For instance, some attacks may occur during nonworking hours, or attackers might intentionally carry out attacks during holidays when network traffic is typically more congested, making it easier to conceal their malicious activities [47,48]. Therefore, network intrusion detection needs to consider the temporal dependencies before and after attack events to gain a comprehensive understanding of intrusion behavior patterns.…”
Section: Bidirectional Long Short-term Memorymentioning
confidence: 99%
“…Cybercriminals use malware or malicious software for many reasons. For instance: To illegally obtain sensitive data from the individual via stealing or online fraud, for example, passwords, bank and credit card details and business-related data, and so on [23] . To acquire remote admittance to machines and networks.…”
Section: Background and Financial Impact Of Malware Attacks On Societymentioning
confidence: 99%
“…To illegally obtain sensitive data from the individual via stealing or online fraud, for example, passwords, bank and credit card details and business-related data, and so on [23] .…”
Section: Background and Financial Impact Of Malware Attacks On Societymentioning
confidence: 99%
“…The trend is to move away from traditional security approaches and embrace predictive methods capable of detecting sophisticated attacks [4]. The cost of cyber attacks continues to increase, and it will likely follow the same trajectory.…”
Section: Introductionmentioning
confidence: 99%