Malware Attack Predictive Analytics in a Cyber Supply Chain Context Using Machine Learning

Abel Yeboah-Ofori, C. Boachie
{"title":"Malware Attack Predictive Analytics in a Cyber Supply Chain Context Using Machine Learning","authors":"Abel Yeboah-Ofori, C. Boachie","doi":"10.1109/ICSIoT47925.2019.00019","DOIUrl":null,"url":null,"abstract":"Due to the invincibility nature of cyber attacks onthe cyber supply chain (CSC), and the cascading effects ofmalware infections, we use machine learning to predictattacks. As organizations have become more reliant on CSCsystems for business continuity, so are the increase invulnerabilities and the threat landscapes. Some traditionalapproach to detecting and defending malware attack haslargely been antimalware or antivirus software such asspam filters, firewall, and IDS/IPS. These tools largelysucceed, however, as threat actors get more intelligent, theyare able to circumvent and affect nodes on systems whichthen propagates. In our previous work, we characterizedthreat actor activities, including presumed intent andhistorically observed behaviour, for the purpose ofascertaining the current threats that could be exploited. Inthis paper, we use ML techniques to learn dataset andpredict which CSC nodes have detection or no detection. The purpose is to predict which modes are venerable tocyberattacks and for predicting future trends. Todemonstrate the applicability of our approach, we used adataset from Microsoft Malware Prediction website. Further, an ensemble is used to link Logistic Regression, and Decision Tree and SVM algorithms in Majority Votingand run on the training data and then use 10-fold crossvalidation to test the parameter estimation, accurate resultsand predictions. The results show that ML algorithms inDecision Trees methods can be used in cyber supply chainpredict analytics to detect and predict future cyber attacktrends.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIoT47925.2019.00019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

Due to the invincibility nature of cyber attacks onthe cyber supply chain (CSC), and the cascading effects ofmalware infections, we use machine learning to predictattacks. As organizations have become more reliant on CSCsystems for business continuity, so are the increase invulnerabilities and the threat landscapes. Some traditionalapproach to detecting and defending malware attack haslargely been antimalware or antivirus software such asspam filters, firewall, and IDS/IPS. These tools largelysucceed, however, as threat actors get more intelligent, theyare able to circumvent and affect nodes on systems whichthen propagates. In our previous work, we characterizedthreat actor activities, including presumed intent andhistorically observed behaviour, for the purpose ofascertaining the current threats that could be exploited. Inthis paper, we use ML techniques to learn dataset andpredict which CSC nodes have detection or no detection. The purpose is to predict which modes are venerable tocyberattacks and for predicting future trends. Todemonstrate the applicability of our approach, we used adataset from Microsoft Malware Prediction website. Further, an ensemble is used to link Logistic Regression, and Decision Tree and SVM algorithms in Majority Votingand run on the training data and then use 10-fold crossvalidation to test the parameter estimation, accurate resultsand predictions. The results show that ML algorithms inDecision Trees methods can be used in cyber supply chainpredict analytics to detect and predict future cyber attacktrends.
基于机器学习的网络供应链恶意软件攻击预测分析
由于网络供应链(CSC)上网络攻击的不可战胜性,以及恶意软件感染的级联效应,我们使用机器学习来预测攻击。随着企业越来越依赖于csc系统来实现业务连续性,越来越多的漏洞和威胁也随之增加。一些传统的检测和防御恶意软件攻击的方法主要是反恶意软件或防病毒软件,如垃圾邮件过滤器,防火墙和IDS/IPS。这些工具在很大程度上是成功的,然而,随着威胁行为者变得越来越聪明,他们能够绕过并影响系统上的节点,然后传播。在我们之前的工作中,我们描述了威胁行为者的活动,包括假定的意图和历史上观察到的行为,目的是确定当前可能被利用的威胁。在本文中,我们使用ML技术来学习数据集,并预测哪些CSC节点有检测或没有检测。目的是预测哪些模式是值得尊敬的网络攻击和预测未来的趋势。为了证明我们方法的适用性,我们使用了来自微软恶意软件预测网站的数据集。此外,在Majority voting中,使用集成将逻辑回归、决策树和支持向量机算法连接起来,并在训练数据上运行,然后使用10倍交叉验证来测试参数估计、准确的结果和预测。结果表明,决策树方法中的机器学习算法可用于网络供应链预测分析,以检测和预测未来的网络攻击趋势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信