Visible to the public Forecasting Cyberattacks as Time Series with Different Aggregation Granularity

TitleForecasting Cyberattacks as Time Series with Different Aggregation Granularity
Publication TypeConference Paper
Year of Publication2018
AuthorsWerner, Gordon, Okutan, Ahmet, Yang, Shanchieh, McConky, Katie
Conference Name2018 IEEE International Symposium on Technologies for Homeland Security (HST)
ISBN Number978-1-5386-3443-1
Keywordsaggregation granularity, ARIMA, auto-regressive integrated moving average models, autoregressive moving average processes, Bayesian networks, belief networks, binary occurrence metrics, Computer crime, computer network security, Correlation, cyber attack occurrences, cyber defense, Forecasting, incident count forecasting, intrusion detection methods, malicious activity, Malicious Traffic, Malware, Metrics, potential external factors, Predictive models, predictive security metrics, pubcrawl, security, target configuration, time series, Time series analysis, time series construction, Uniform resource locators
Abstract

Cyber defense can no longer be limited to intrusion detection methods. These systems require malicious activity to enter an internal network before an attack can be detected. Having advanced, predictive knowledge of future attacks allow a potential victim to heighten security and possibly prevent any malicious traffic from breaching the network. This paper investigates the use of Auto-Regressive Integrated Moving Average (ARIMA) models and Bayesian Networks (BN) to predict future cyber attack occurrences and intensities against two target entities. In addition to incident count forecasting, categorical and binary occurrence metrics are proposed to better represent volume forecasts to a victim. Different measurement periods are used in time series construction to better model the temporal patterns unique to each attack type and target configuration, seeing over 86% improvement over baseline forecasts. Using ground truth aggregated over different measurement periods as signals, a BN is trained and tested for each attack type and the obtained results provided further evidence to support the findings from ARIMA. This work highlights the complexity of cyber attack occurrences; each subset has unique characteristics and is influenced by a number of potential external factors.

URLhttps://ieeexplore.ieee.org/document/8574185
DOI10.1109/THS.2018.8574185
Citation Keywerner_forecasting_2018