2019
DOI: 10.1016/j.future.2019.03.016
|View full text |Cite
|
Sign up to set email alerts
|

Network entity characterization and attack prediction

Abstract: The devastating effects of cyber-attacks, highlight the need for novel attack detection and prevention techniques. Over the last years, considerable work has been done in the areas of attack detection as well as in collaborative defense. However, an analysis of the state of the art suggests that many challenges exist in prioritizing alert data and in studying the relation between a recently discovered attack and the probability of it occurring again. In this article, we propose a system that is intended for ch… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(29 citation statements)
references
References 17 publications
0
21
0
Order By: Relevance
“…Further works improved the hit counts but did not discuss the hit rates [17,32,38]. The highest hit rates were achieved by Bartoš et al [2], but the hit rate degrades with the size of the blacklist, as presented in Table 1. The success rate of around 65 % in our work outperforms previous works even with large blacklists.…”
Section: Comparison To Previous Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Further works improved the hit counts but did not discuss the hit rates [17,32,38]. The highest hit rates were achieved by Bartoš et al [2], but the hit rate degrades with the size of the blacklist, as presented in Table 1. The success rate of around 65 % in our work outperforms previous works even with large blacklists.…”
Section: Comparison To Previous Resultsmentioning
confidence: 99%
“…Finally, Melis et al [32] combined two of the previous approaches [17,38], and achieved balance of their strengths and weaknesses, again on DShield data. Predictive blacklisting is also the desired use case of network entity reputation scoring in the work of Bartoš et al [2], who used the data from the SABU alert sharing platform [6] that was also used in this work. The attention of the researchers in the field is also focused on countermeasure selection, e.g., as surveyed by Nespoli et al [33].…”
Section: Dshieldmentioning
confidence: 99%
“…The data set offers an up-to-date view of network security alerts and reflects the current cybersecurity threat landscape. The data set encourages experimenting with the advanced methods of alert aggregation and correlation [4] , including temporal and spatial correlations [6] , reputation scoring [7] , attack scenario reconstruction [8] , and attack projection [9] . Alert correlation and attack scenario reconstructions methods allow inferring insights into the behavior of the attackers.…”
Section: Value Of the Datamentioning
confidence: 99%
“…Interestingly, Antonakakis, Perdisci, Dagon, Lee, and Feamster [2010] propose a dynamic approach to reputation scoring that adjusts the reputation score according to the level of maliciousness. However, Pronk [2011] and Bartos et al [2019] highlight limitations associated with dependence on blacklists, where attack signatures may change and thus render blacklists inefficient. Pronk [2011] describes IP reputation as a concept of rating a host based on their past actions and comparing high-level information such as domain names to a group of hosts whose reputation is known.…”
Section: Reputation Scoringmentioning
confidence: 99%