Skip to main content

Bayesian Networks for Online Cybersecurity Threat Detection

  • Chapter
  • First Online:

Part of the book series: Studies in Computational Intelligence ((SCI,volume 919))

Abstract

Cybersecurity threats have surged in the past decades. Experts agree that conventional security measures will soon not be enough to stop the propagation of more sophisticated and harmful cyberattacks. Recently, there has been a growing interest in mastering the complexity of cybersecurity by adopting methods borrowed from Artificial Intelligence (AI) in order to support automation. In this  chapter, we concentrate on cybersecurity threat assessment by the translation of Attack Trees (AT) into probabilistic detection models based on Bayesian Networks (BN). We also show how these models can be integrated and dynamically updated as a detection engine in the existing DETECT framework for automated threat detection, hence enabling both offline and online threat assessment. Integration in DETECT is important to allow real-time model execution and evaluation for quantitative threat assessment. Finally, we apply our methodology to a real-world case study, evaluate the resulting model with sample data, perform data sensitivity analyses, then present and discuss the results.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. IEEE, Syntegrity (2017) Artificial intelligence and machine learning applied to cybersecurity, presented in Washington DC, USA, 6th–8th October 2017, [Online]. Available at https://www.ieee.org/content/dam/ieeeorg/ieee/web/org/about/industry/ieee_confluence_report.pdf?utm_source=lp-linktext&utm_medium=industry&utm_campaign=confluence-paper. Accessed 20 Mar 2018

  2. Pappaterra MJ, Flammini F (2019) A review of intelligent cybersecurity with Bayesian Networks. In: 2019 IEEE international conference on systems, man and cybernetics (SMC), Bari, Italy, pp 445–452

    Google Scholar 

  3. Shackleford D (2016) SANS 2016 Security Analytics Survey, SANS Institute. [Online]. Available at https://www.sans.org/reading-room/whitepapers/analyst/2016-securityanalytics-survey-37467. Accessed 3 Mar 2018

  4. Flammini F, Gaglione A, Otello F, Pappalardo A, Pragliola C, Tedesco A (2010) Towards wireless sensor networks for railway infrastructure monitoring. Ansaldo STS Italy, Università di Napoli Federico II

    Google Scholar 

  5. Flammini F, Gaglione A, Mazzocca N, Pragliola C (2008) DETECT: a novel framework for the detection of attacks to critical infrastructures. In: Proceedings of ESREL’08, safety, reliability and risk analysis: theory, methods and applications. CRC Press, Taylor & Francis Group, London, pp 105–112

    Google Scholar 

  6. Gaglione A (2009, November) Threat analysis and detection in critical infrastructure security, Università di Napoli Federico II, Comunità Europea Fondo Sociale Europeo

    Google Scholar 

  7. Flammini F, Gaglione A, Mazzocca N, Moscato V, Pragliola C (2009) Online Integration and reasoning for multi-sensor data to enhance infrastructure surveillance. J Inf Assur Secur 4:183–191

    Google Scholar 

  8. Flammini F, Gaglione A, Mazzocca N, Moscato V, Pragliola C (2009) Wireless sensor data fusion for critical infrastructure security. In: CISIS, Springer, Berlin Germany, pp 92–99

    Google Scholar 

  9. Flammini F, Mazzocca N, Pappalardo A, Vittorini V, Pagliola C (2015) Improving the dependability of distributed surveillance systems using diverse redundant detectors. Dependability problems of complex information systems, Springer International Publishing. https://www.researchgate.net/publication/282269486_Improving_the_Dependability_of_Distributed_Surveillance_Systems_Using_Diverse_Redundant_Detectors

  10. Schneier B (1999) Attack trees. Dobb’s J 21–22, 24, 26, 28–29. [Online]. Available at https://www.schneier.com/academic/archives/1999/12/attack_trees.html. Accessed 20 Mar 2018

  11. Bobbio A, Portinale L, Minichino M, Ciancamerla E (2001) Improving the analysis of dependable systems by mapping fault trees into Bayesian Networks. In: Reliability engineering and system safety, vol 71, Rome, Italy, pp 249–260

    Google Scholar 

  12. Gribaudo M, Iacono M, Marrone S (2015) Exploiting Bayesian Networks for the analysis of combined attack trees. In: Electronic notes in theoretical computer science, vol 310. Elsevier B.V., pp 91–11

    Google Scholar 

  13. Mauw S, Oostdijk M (2005) Foundations of attack trees. In: International conference on information security and cryptology ICISC 2005. LNCS 3935. Springer, pp 186–198

    Google Scholar 

  14. Charniak E (1991) Bayesian networks without tears: making Bayesian networks more accessible to the probabilistically unsophisticated. AI Mag 12(4):50–63

    Google Scholar 

  15. Symantec Corporation (2017) The Internet Security Threat Report (ISTR) 2017. [Online]. Available at https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf. Accessed 13 Mar 2018

  16. Buczak A, Guven E (2016) A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Commun Surv Tutorials 18(2)

    Google Scholar 

  17. OWASP (2017) Top 10—2017. [Online]. Available at https://www.owasp.org/index.php/Top_10_2017-Top_10. Accessed 13 Mar 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mauro José Pappaterra .

Editor information

Editors and Affiliations

Appendices

Appendix 1

figure a
figure b

Appendix 2

figure c
figure d
figure e

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pappaterra, M.J., Flammini, F. (2021). Bayesian Networks for Online Cybersecurity Threat Detection. In: Maleh, Y., Shojafar, M., Alazab, M., Baddi, Y. (eds) Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Studies in Computational Intelligence, vol 919. Springer, Cham. https://doi.org/10.1007/978-3-030-57024-8_6

Download citation

Publish with us

Policies and ethics