Computational Techniques for Predicting Cyber Threats

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 308)

Abstract

With the increasing usage of Internet and computing devices with network competence, the Internet crimes and cyber attacks are increasing exponentially. Most of the existing detection and protection systems rely on signature based methods and are unable to detect sophisticated and targeted attacks like advanced persistent threats (APTs). In order to protect Internet users and cyber infrastructure from various threats, proactive defense systems are required, which have the capability to make intelligent decisions in real time. This paper reviews various computational techniques used in the literature for predicting cyber threats. It also highlights the challenges, which can be explored by researchers for future studies.

Keywords

Cyber attacks Cyber threats Prediction Intelligence 

References

  1. 1.
    Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 5, 56–64 (2014)CrossRefGoogle Scholar
  2. 2.
    Thomas, T.: Google confronts China’s “Three Warfares”. In: Parameters: U.S. Army War College, vol. 40(2), p. 101 (2010)Google Scholar
  3. 3.
    Shakarian, P.: Stuxnet: Cyberwar revolution in military affairs. Small Wars J. (2011)Google Scholar
  4. 4.
  5. 5.
  6. 6.
    Subrahmanian, V.: Handbook of Computational Approaches to Counterterrorism. Springer, Berlin (2013)CrossRefGoogle Scholar
  7. 7.
    Brockwell, P., Davis, R.: Introduction to Time Series and Forecasting. Springer, Berlin (2010)MATHGoogle Scholar
  8. 8.
    Park, H., Jung, O., Lee, H., In, H.: Cyber weather forecasting: forecasting unknown internet worms using randomness analysis. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) Information Security and Privacy Research, AICT, vol. 376, pp. 376–387. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  9. 9.
    Pontes, E., Guelfi, A.: IFS: intrusion forecasting system based on collaborative architecture. In: 4th IEEE International Conference on Digital Information Management, pp. 1–6. IEEE Press, Ann Arbor (2009)Google Scholar
  10. 10.
    Pontes, E., Guelfi, A., Silva, A., Kofuji, S.: Applying multi-correlation for improving forecasting in cyber security. In: 6th International Conference on Digital Information Management, pp 179–186. Melbourne (2011)Google Scholar
  11. 11.
    Fachkha, C., Harb, E., Debbabi, M.: Towards a forecasting model for distributed denial of service activities. In: 12th IEEE International Symposium on Network computing and Applications, pp. 110–117. Cambridge, MA (2013)Google Scholar
  12. 12.
    Watters, P., McCombie, S., Layton, R., Pieprzyk, J.: Characterising and predicting cyber attacks using the cyber attacker model profile (CAMP). J. Money Laundering Control 15, 430–441 (2012)CrossRefGoogle Scholar
  13. 13.
    Feller, W.: An introduction to probability theory and its applications. Willey, New York (1971)MATHGoogle Scholar
  14. 14.
    Wu, J., Yin, L., Guo, Y.: Cyber attacks prediction model based on bayesian networks. In: 18th International Conference on Parallel and Distributed Systems, pp. 730–731. IEEE Press, Singapore (2012)Google Scholar
  15. 15.
    Kim, D., Lee, T., Jung, O., Peter, H.: Cyber threat trend analysis model using HMM. In: 3rd International Symposium on Information Assurance and Security, pp. 177–182. IEEE Press, Manchester (2007)Google Scholar
  16. 16.
    Man, D., Wang, Y., Wu, Y., Wang, W.: A combined prediction method for network security situation. In: International Conference on Computational Intelligence and Software Engineering, pp. 1–4. IEEE Press, Wuhan (2010)Google Scholar
  17. 17.
    Chenq, C.: A High-efficiency intrusion prediction technology based on Markov chain. In: Computational Intelligence and Security Workshop, pp. 518–521. IEEE Press, Harbin (2007)Google Scholar
  18. 18.
    Lim, S., Yun, S., Kim, J., Lee, B.: Prediction model for Botnet-based cyber threats. In: International conference on Convergence, pp. 340–341. IEEE Press, Jeju Island (2012)Google Scholar
  19. 19.
    Fava, D., Byers, S., Yang, S.: Projecting cyberattacks through variable-length Markov models. IEEE Trans. Inf. Forensics Secur. 3, 359–369 (2008)CrossRefGoogle Scholar
  20. 20.
    Maloof, M.: Machine learning and data mining for computer security: methods and applications. Springer, New York (2006)CrossRefGoogle Scholar
  21. 21.
    Thonnard, O., Dacier, M.: Actionable knowledge discovery for threat intelligence support using a multi dimensional data mining methodology. In: IEEE International Conference on Data Mining Workshops, pp. 154–163, IEEE Press, Pisa (2008)Google Scholar
  22. 22.
    Farhadi, H., AmirHaeri, M., Khansari, M.: Alert correlation and prediction using data mining and HMM. ISC Int. J. Inf. Secur. 3, 77–101 (2011)Google Scholar
  23. 23.
    Tang, C., Xie, Y., Quang, B., Wang, X., Zhang, R.: Security situation prediction based on dynamic BP neural with covariance. In: Advanced in Control Engineering and Information Science, pp. 3313–3317 (2011)Google Scholar
  24. 24.
    Kim, S., Shin, S., Kim, H., Kwon, K., Hen, Y.: Hybrid intrusion forecasting framework for early warning system. In: IEICE transaction on information and systems, ACM, E91-D, pp. 1234–1241 (2008)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringPEC University of TechnologyChandigarhIndia

Personalised recommendations