Visible to the public Probabilistic Threat Propagation for Network Security

TitleProbabilistic Threat Propagation for Network Security
Publication TypeJournal Article
Year of Publication2014
AuthorsCarter, K.M., Idika, N., Streilein, W.W.
JournalInformation Forensics and Security, IEEE Transactions on
Volume9
Pagination1394-1405
Date PublishedSept
ISSN1556-6013
KeywordsBlacklist, Botnet, Botnets detection, Communication networks, Communities, community detection, computer network security, cyclic propagation, digital forensics, external Internet, forensic analysis, graph algorithms, graph analytics world, graph theory, graphical modeling work, infected nodes, Internet, malicious nodes, malicious Web destinations, monitored networks, network hosts, Network security, network security analysis, Peer-to-peer computing, Probabilistic logic, probabilistic threat propagation, probability, security, threat probabilities, Upper bound
Abstract

Techniques for network security analysis have historically focused on the actions of the network hosts. Outside of forensic analysis, little has been done to detect or predict malicious or infected nodes strictly based on their association with other known malicious nodes. This methodology is highly prevalent in the graph analytics world, however, and is referred to as community detection. In this paper, we present a method for detecting malicious and infected nodes on both monitored networks and the external Internet. We leverage prior community detection and graphical modeling work by propagating threat probabilities across network nodes, given an initial set of known malicious nodes. We enhance prior work by employing constraints that remove the adverse effect of cyclic propagation that is a byproduct of current methods. We demonstrate the effectiveness of probabilistic threat propagation on the tasks of detecting botnets and malicious web destinations.

URLhttps://ieeexplore.ieee.org/document/6847231
DOI10.1109/TIFS.2014.2334272
Citation Key6847231