Challenges in Forecasting Malicious Events from Incomplete Data. Tavabi, N., Abeliuk, A., Mokhberian, N., Abramson, J., & Lerman, K. In Companion Proceedings of the Web Conference 2020, of WWW '20, pages 603–610, New York, NY, USA, 2020. Association for Computing Machinery.
Challenges in Forecasting Malicious Events from Incomplete Data [link]Paper  doi  abstract   bibtex   
The ability to accurately predict cyber-attacks would enable organizations to mitigate their growing threat and avert the financial losses and disruptions they cause. But how predictable are cyber-attacks? Researchers have attempted to combine external data – ranging from vulnerability disclosures to discussions on Twitter and the darkweb – with machine learning algorithms to learn indicators of impending cyber-attacks. However, successful cyber-attacks represent a tiny fraction of all attempted attacks: the vast majority are stopped, or filtered by the security appliances deployed at the target. As we show in this paper, the process of filtering reduces the predictability of cyber-attacks. The small number of attacks that do penetrate the target’s defenses follow a different generative process compared to the whole data which is much harder to learn for predictive models. This could be caused by the fact that the resulting time series also depends on the filtering process in addition to all the different factors that the original time series depended on. We empirically quantify the loss of predictability due to filtering using real-world data from two organizations. Our work identifies the limits to forecasting cyber-attacks from highly filtered data.
@inproceedings{10.1145/3366424.3385774,
author = {Tavabi, Nazgol and Abeliuk, Andr{\'{e}}s and Mokhberian, Negar and Abramson, Jeremy and Lerman, Kristina},
title = {Challenges in Forecasting Malicious Events from Incomplete Data},
year = {2020},
isbn = {9781450370240},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3366424.3385774},
doi = {10.1145/3366424.3385774},
abstract = {The ability to accurately predict cyber-attacks would enable organizations to mitigate their growing threat and avert the financial losses and disruptions they cause. But how predictable are cyber-attacks? Researchers have attempted to combine external data – ranging from vulnerability disclosures to discussions on Twitter and the darkweb – with machine learning algorithms to learn indicators of impending cyber-attacks. However, successful cyber-attacks represent a tiny fraction of all attempted attacks: the vast majority are stopped, or filtered by the security appliances deployed at the target. As we show in this paper, the process of filtering reduces the predictability of cyber-attacks. The small number of attacks that do penetrate the target’s defenses follow a different generative process compared to the whole data which is much harder to learn for predictive models. This could be caused by the fact that the resulting time series also depends on the filtering process in addition to all the different factors that the original time series depended on. We empirically quantify the loss of predictability due to filtering using real-world data from two organizations. Our work identifies the limits to forecasting cyber-attacks from highly filtered data.},
booktitle = {Companion Proceedings of the Web Conference 2020},
pages = {603–610},
numpages = {8},
keywords = {cyber-attack, permutation entropy, time-series, forecasting, predictability},
location = {Taipei, Taiwan},
series = {WWW '20}
}

Downloads: 0