Abstract
In recent years, cyberattacks have increased rapidly in huge volumes and diversity. Despite the existence of advanced cyber-defence systems, attacks and intrusions still occur. Defence systems tried to block previously known attacks, stop ongoing attacks and detect occurred attacks. However, often the damage caused by an attack is catastrophic. Consequently, the need for improved intrusion detection systems and proposed robust prediction system is more urgent these days. In this chapter, we investigate the intrusion prediction systems to show the need for such system, the insufficiency of the current intrusion detection systems and how prediction will improve the security capabilities for defence systems. A survey of intrusion prediction systems in cybersecurity, the concepts of work and methods used in these systems is presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Waxman, M.C.: Cyber-attacks and the use of force: back to the future of article 2(4). Yale J. Int. Law 36, 421–458 (2011)
Garrett, B.N.: Taming the Wild Wild Web: twenty-first century prize law and privateers as a solution to combating cyber-attacks. Univ. Cincinnati Law Rev. 81(2), 684–706 (2013)
Wood, P., Nahorney, B., Chandrasekar, K., Wallace, S., Haley, K.: Internet Security Threat Report, vol. 19. Symantec Corp, Mountain View, CA (2014)
Tomaso, M.: BP fights off up to 50,000 cyber-attacks a day: CEO. http://www.cnbc.com/ [Online]. http://www.cnbc.com/id/100529483#. Accessed 19 Nov 2014
Chinn, D., Kaplan, J., Weinberg, A.: Risk and Responsibility in a Hyperconnected World: Implications for Enterprises. McKinsey Co., New York City, NY (2014)
Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
Wang, H., Zhou, H.: The research of intrusion detection system in cloud computing environment. Adv. Multimedia Softw. Eng. Comput. 1, 45–49 (2012)
Ginsburg, A., Santos, L.J., Scoboria, E., Scoboria, K., Yeoh, J.: The Notorious Nine: Cloud Computing Top Threats in 2013, pp. 1–14. Cloud Security Alliance, San Jose, CA (2013)
Bace, R., Mell, P.: NIST special publication on intrusion detection systems NIST special publication on intrusion detection systems. Natl. Inst. Stand. Technol. 800-94, 1–51 (2011)
Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS) Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology, Gaithersburg, MD (2007)
Shorr, A.F., Zilberberg, M.D., Micek, S.T., Kollef, M.H.: Prediction of infection due to antibiotic-resistant bacteria by select risk factors for health care-associated pneumonia. JAMA Intern. Med. 168(20), 2205–2210 (2008)
Yang, Q., Khoury, M.J., Botto, L., Friedman, J.M., Flanders, W.D.: Improving the prediction of complex diseases by testing for multiple disease-susceptibility genes. Am. J. Hum. Genet. 72(3), 636–649 (2003)
Sudha, A.S.A., Gayathri, P., Jaisankar, N.: Utilization of data mining approaches for prediction of life threatening diseases survivability. Int. J. Comput. Appl. 41(17), 51–55 (2012)
Fenton, N.E., Centre for Software Reliability, London, UK, Neil, M.: A critique of software defect prediction models. IEEE Trans. Softw. Eng. 25(5), 675–689 (1999)
Hatton, L.: Reexamining the fault density-component size connection. IEEE Softw. 14(2), 89–97 (1997)
LeBaron, B., Arthur, W.B., Palmer, R.: Time series properties of an artificial stock market. J. Econ. Dyn. Control 23(9–10), 1487–1516 (1999)
Shen, S., Jiang, H., Zhang, T.: Stock Market Forecasting Using Machine Learning Algorithms, pp. 1–5. Department of Electrical Engineering, Stanford University, Stanford, CA (2012)
Hassan, M.R., Nath, B.: Stock market forecasting using hidden Markov model: a new approach. 5th International conference on intelligent systems design and applications (ISDA’05), pp. 192–196 (2005)
Agarwal, V., Taffler, R.: Comparing the performance of market-based and accounting-based bankruptcy prediction models. J. Bank Finance 32(8), 1541–1551 (2008)
Režňáková, M., Karas, M.: Bankruptcy prediction models: can the prediction power of the models be improved by using dynamic indicators? Proc. Econ. Finance 12(14), 565–574 (2014)
Toth, E., Brath, A., Montanari, A.: Comparison of short-term rainfall prediction models for real-time flood forecasting. J. Hydrol. 239(1–4), 132–147 (2000)
Gardner, R.D., Harle, D.A.: Methods and systems for alarm correlationProc. GLOBECOM’96. IEEE Glob. Telecommun. Conf. 1, 136–140 (1996)
Sadoddin, R., Ghorbani, A.: Alert correlation survey : framework and techniques. Proceedings of the 2006 international conference on privacy, security and trust: bridge the gap between PST technologies and business services, pp. 1–10 (2006)
Shameli Sendi, A., Dagenais, M., Jabbarifar, M., Couture, M.: Real time intrusion prediction based on optimized alerts with Hidden Markov Model. J Netw. 7(2), 311–321 (2012)
Kim, Y.-H., Park, W.H.: A study on cyber threat prediction based on intrusion detection event for APT attack detection. Multimedia Tools Appl. 71(2), 685–698 (2014)
Farhadi, H., Amirhaeri, M., Khansari, M.: Alert correlation and prediction using data mining and HMM. ISC Int. J. Inf. Secur. 3(2), 77–101 (2011)
Pontes, E., Guelfi, A.E., Kofuji, S.T., Silva, A.A.A., Guelfi, A.E.: Applying multi-correlation for improving forecasting in cyber security. In: The sixth international conference on digital information management (ICDIM), pp. 179–186 (2011)
Fava, D.S., Byers, S.R., Yang, S.J.: Projecting cyberattacks through variable-length Markov models. IEEE Trans. Inf. Forensic Secur. 3(3), 359–369 (2008)
Zhengdao, Z., Zhumiao, P., Zhiping, Z.: The study of intrusion prediction based on HsMM. 2008 I.E. Asia-Pacific services computing conference, pp. 1358–1363 (2008)
Feng, L., Guan, X., Guo, S., Gao, Y., Liu, P.: Predicting the intrusion intentions by observing system call sequences. Comput. Secur. 23(3), 241–252 (2004)
Zhang, G., Sun, J.: A novel network intrusion attempts prediction model based on fuzzy neural network. Lect. Notes Comput. Sci. 3991(2002), 419–426 (2006)
Bienkowski, M., Feng, M., Means, B.: Enhancing Teaching and Learning Through Educational Data Mining and Learning Analytics: An Issue Brief, pp. 1–57. SRI International, Washington, DC (2012)
Ramasubramanian, P., Kannan, A.: Quickprop neural network short-term forecasting framework for a database intrusion prediction system. Artif. Intell. Soft. Comput. 3070(1), 847–852 (2004)
Alampalayam, S.P., Kumar, A.: Predictive security model using data mining. Globecom 502, 2208–2212 (2004)
Fachkha, C., Bou-Harb, E., Debbabi, M.: Towards a forecasting model for distributed denial of service activities. In: 2013 I.E. 12th international symposium networking and computer application, pp. 110–117, Aug 2013 (2013)
Park, H., Jung, S.-O.D., Lee, H., In, H.P.: Cyber weather forecasting forecasting unknown internet worms using randomness analysis. IFIP Adv. Inf. Commun. Technol. 376, 376–387 (2012)
Ghahramani, Z.: An introduction to hidden Markov models and Bayesian networks. Int. J. Pattern Recognit. Artif. Intell. 15(1), 9–42 (2001)
Baruah, P., Chinnam, R.B.: HMMs for diagnostics and prognostics in machining processes. Int. J. Prod. Res. 43(6), 1275–1293 (2005)
Lai-cheng, C.: A high-efficiency intrusion prediction technology based on Markov chain. In: International conference on computational intelligence and security workshops, pp. 522–525 (2007)
Wu, J., Yin, L., Guo, Y.: Cyber attacks prediction model based on Bayesian network. In: 2012 I.E. 18th international conferences parallel and distributed systems, pp. 730–731, Dec 2012 (2012)
Ishida, C., Arakawa, Y., Sasase, I., Takemori, K.: Forecast techniques for predicting increase or decrease of attacks using Bayesian inference. In: 2005 I.E. Pacific Rim Conference on communications, computers and signal processing, 2005. PACRIM, pp. 450–453 (2005)
Liu, H., Motoda, H.: Feature Extraction, Construction and Selection: A Data Mining Perspective. Springer, New York, NY (1998)
Guyon, I., Elisseeff, A.: An introduction to feature extraction. In: Guyon, I.M. (ed.) Feature Extraction, Foundations and Applications, p. 24. Springer, Berlin (2006)
Watters, P.A., McCombie, S., Layton, R., Pieperzyk, J.: Characterising and predicting cyber-attacks using the Cyber Attacker Model Profile (CAMP). J. Money Laund. Control 15(4), 430–441 (2012)
Cheng-Bin, L.: A new intrusion prediction method based on feature extraction. In: Second international workshop on computer science and engineering, pp. 7–10 (2009)
Haslum, K., Abraham, A., Knapskog, S.: DIPS: a framework for distributed intrusion prediction and prevention using hidden Markov models and online fuzzy risk assessment. Third Int. Symp. Inf. Assur. Secur. 2007, 183–190 (2007)
Tabia, K., Leray, L.: Bayesian network-based approaches for severe attack prediction and handling IDSs’ reliability. In: 13th international conference, IPMU 2010, Dortmund, Germany, 28 Jun to 2 Jul 2010. Proceedings, part II, pp. 632–642 (2010)
Sindhu, S.S.S., Geetha, S., Sivanath, S.S., Kannan, A.: A neuro-genetic ensemble short term forecasting framework for anomaly intrusion prediction. 2006 International conference advanced computing & communication, pp. 187–190 (2006)
KDD-CUP-99 Task Description. [Online]. https://kdd.ics.uci.edu/databases/kddcup99/task.html. Accessed 27 Apr 2015
Poojitha, G., Kumar, K., JayaramiReddy, P.: Intrusion detection using artificial neural network. Second international conference on computing, communication and networking technologies, pp. 1–7 (2010)
Tang, C., Xie, Y., Qiang, B., Wang, X., Zhang, R.: Security situation prediction based on dynamic BP neural with covariance. Adv. Control Eng. Inf. Sci. 15, 3313–3317 (2011)
Jaiganesh, V., Mangayarkarasi, S., Sumathi, P.: Intrusion detection systems: a survey and analysis of classification techniques. Int. J. Adv. Res. Comput. Commun. Eng. 2(4), 1629–1635 (2013)
Li, L., Lei, J., Wang, L., Li, D.: A data mining approach to generating network attack graph for intrusion prediction. In: Fourth international conference on fuzzy systems and knowledge discovery (FSKD 2007), no. Fskd, pp. 307–311 (2007)
Onolaja, O., Bahsoon, R., Theodoropoulos, G.: Conceptual framework for dynamic trust monitoring and prediction. Proc. Comput. Sci. 1(1), 1241–1250 (2012)
Jayasinghe, G.K., Shane Culpepper, J., Bertok, P.: Efficient and effective realtime prediction of drive-by download attacks. J. Netw. Comput. Appl. 38, 135–149 (2014)
Kannadiga, P., Zulkernine, M., Haque, A., Canada, B.: E-NIPS: an event-based network intrusion prediction. In: Proceedings of the 10th international conference, ISC 2007, ValparaÃso, Chile, 9–12 Oct 2007, pp. 37–52 (2007)
Pontes, E., Lsi, P., Paulo, S.: IFS – intrusion forecasting system based on collaborative architecture. In: Fourth international conference on digital information management, 2009. ICDIM 2009, pp. 216–221 (2009)
Grunske, L., Joyce, D.: Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles. J. Syst. Softw. 81(8), 1327–1345 (2008)
Park, H., Lee, H.: Detecting unknown worms using randomness check. Inf. Netw. Adv. Data Commun. Wirel. Netw. 3961, 775–784 (2006)
Bailey, M., Cooke, E., Jahanian, F., Myrick, A., Sinha, S., Arbor, A.: Practical darknet measurement. In: 2006 I.E. conference on information sciences and systems, 2007, pp. 1496–1501 (2007)
Abdlhamed, M., Kifayat, K., Shi, Q., Hurst, W.: A system for intrusion prediction in cloud computing. In: Boubiche, D.E., et al. (eds.) Proceedings of the International Conference on Internet of Things and Cloud Computing (ICC 2016), pp. 1–9. University of Cambridge, Cambridge (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Abdlhamed, M., Kifayat, K., Shi, Q., Hurst, W. (2017). Intrusion Prediction Systems. In: Alsmadi, I., Karabatis, G., Aleroud, A. (eds) Information Fusion for Cyber-Security Analytics. Studies in Computational Intelligence, vol 691. Springer, Cham. https://doi.org/10.1007/978-3-319-44257-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-44257-0_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44256-3
Online ISBN: 978-3-319-44257-0
eBook Packages: EngineeringEngineering (R0)