2017
DOI: 10.1109/tifs.2017.2705629
|View full text |Cite
|
Sign up to set email alerts
|

Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach

Abstract: Abstract-We analyze sets of intrusion detection records observed on the networks of several large, nonresidential organizations protected by a form of intrusion detection and prevention service. Our analyses reveal that the process of intrusion detection in these networks exhibits a significant degree of burstiness as well as strong memory, with burstiness and memory properties that are comparable to those of natural processes driven by threshold effects, but different from bursty human activities. We explore … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(17 citation statements)
references
References 36 publications
2
15
0
Order By: Relevance
“…Bursts in cyber attacks, however, are not a universal pattern. Using analyst verified reports, bursts of cyber attacks were found in only three out of five customer computers/networks protected by a CSSP [12]. Similarly, bursts were not reported for distributed denial-of-service (DDoS) attacks, but these data were limited to one-minute intervals over less than an hour [24].…”
Section: Forecasting and Burstsmentioning
confidence: 97%
See 1 more Smart Citation
“…Bursts in cyber attacks, however, are not a universal pattern. Using analyst verified reports, bursts of cyber attacks were found in only three out of five customer computers/networks protected by a CSSP [12]. Similarly, bursts were not reported for distributed denial-of-service (DDoS) attacks, but these data were limited to one-minute intervals over less than an hour [24].…”
Section: Forecasting and Burstsmentioning
confidence: 97%
“…Other potential applications for cyber event forecasting include proactive allocation of resources and capabilities for cyber defense (e.g., analyst staffing and sensor configuration) in CSSPs. Enhanced threat awareness may improve cybersecurity by helping to optimize human and technical capabilities for cyber defense.In contrast, nearly all prior research on modeling cyber attacks [4-10] lacked analyst detection and verification of computer security incidents with the exceptions of [11,12]. In these two exceptions, security incidents were verified by system administrators at a large university [11] or verified by analysts at a CSSP [12].…”
mentioning
confidence: 99%
“…Even if the TDS identifies an anomalous event related to the attack, cyber analysts are barraged with alerts on a daily basis and face the problem of finding a "needle in a haystack". Existing automated TDS are notorious for generating a high amount of false alarms [59], [2], [6], [34], [21]. Cyber analysts are in short supply, so organizations face a key challenge in managing the enormous volume of alerts they receive using the limited time of analysts [4].…”
Section: B Existing Tools Limitationsmentioning
confidence: 99%
“…Researchers have also proposed to automatically detect attacks using machine learning [38], [64]. However, these methods also have significant detection error and suffer from generating too many false alerts [58], [34].…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, the system was treated as a statistical Markov model containing a set of observable states and a set of hidden states, and the model was used to effectively detect the intrusion behavior in the network, highlighting the keys in the maintenance of the tolerance system. To prevent illegal intrusion into the network of large non-res-F. Li idential organizations, Harang and Kott [3] proposed a hidden Markov model with restricted hidden state, which couples Markov chain with Monte-Carlo simulation. By analyzing the combination of intrusion time series, the proposed model parses and predicts the network risks and provides the defense measures.…”
Section: Introductionmentioning
confidence: 99%