{"title":"基于机器学习的网络供应链恶意软件攻击预测分析","authors":"Abel Yeboah-Ofori, C. Boachie","doi":"10.1109/ICSIoT47925.2019.00019","DOIUrl":null,"url":null,"abstract":"Due to the invincibility nature of cyber attacks onthe cyber supply chain (CSC), and the cascading effects ofmalware infections, we use machine learning to predictattacks. As organizations have become more reliant on CSCsystems for business continuity, so are the increase invulnerabilities and the threat landscapes. Some traditionalapproach to detecting and defending malware attack haslargely been antimalware or antivirus software such asspam filters, firewall, and IDS/IPS. These tools largelysucceed, however, as threat actors get more intelligent, theyare able to circumvent and affect nodes on systems whichthen propagates. In our previous work, we characterizedthreat actor activities, including presumed intent andhistorically observed behaviour, for the purpose ofascertaining the current threats that could be exploited. Inthis paper, we use ML techniques to learn dataset andpredict which CSC nodes have detection or no detection. The purpose is to predict which modes are venerable tocyberattacks and for predicting future trends. Todemonstrate the applicability of our approach, we used adataset from Microsoft Malware Prediction website. Further, an ensemble is used to link Logistic Regression, and Decision Tree and SVM algorithms in Majority Votingand run on the training data and then use 10-fold crossvalidation to test the parameter estimation, accurate resultsand predictions. The results show that ML algorithms inDecision Trees methods can be used in cyber supply chainpredict analytics to detect and predict future cyber attacktrends.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Malware Attack Predictive Analytics in a Cyber Supply Chain Context Using Machine Learning\",\"authors\":\"Abel Yeboah-Ofori, C. Boachie\",\"doi\":\"10.1109/ICSIoT47925.2019.00019\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the invincibility nature of cyber attacks onthe cyber supply chain (CSC), and the cascading effects ofmalware infections, we use machine learning to predictattacks. As organizations have become more reliant on CSCsystems for business continuity, so are the increase invulnerabilities and the threat landscapes. Some traditionalapproach to detecting and defending malware attack haslargely been antimalware or antivirus software such asspam filters, firewall, and IDS/IPS. These tools largelysucceed, however, as threat actors get more intelligent, theyare able to circumvent and affect nodes on systems whichthen propagates. In our previous work, we characterizedthreat actor activities, including presumed intent andhistorically observed behaviour, for the purpose ofascertaining the current threats that could be exploited. Inthis paper, we use ML techniques to learn dataset andpredict which CSC nodes have detection or no detection. The purpose is to predict which modes are venerable tocyberattacks and for predicting future trends. Todemonstrate the applicability of our approach, we used adataset from Microsoft Malware Prediction website. Further, an ensemble is used to link Logistic Regression, and Decision Tree and SVM algorithms in Majority Votingand run on the training data and then use 10-fold crossvalidation to test the parameter estimation, accurate resultsand predictions. The results show that ML algorithms inDecision Trees methods can be used in cyber supply chainpredict analytics to detect and predict future cyber attacktrends.\",\"PeriodicalId\":226799,\"journal\":{\"name\":\"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSIoT47925.2019.00019\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIoT47925.2019.00019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Malware Attack Predictive Analytics in a Cyber Supply Chain Context Using Machine Learning
Due to the invincibility nature of cyber attacks onthe cyber supply chain (CSC), and the cascading effects ofmalware infections, we use machine learning to predictattacks. As organizations have become more reliant on CSCsystems for business continuity, so are the increase invulnerabilities and the threat landscapes. Some traditionalapproach to detecting and defending malware attack haslargely been antimalware or antivirus software such asspam filters, firewall, and IDS/IPS. These tools largelysucceed, however, as threat actors get more intelligent, theyare able to circumvent and affect nodes on systems whichthen propagates. In our previous work, we characterizedthreat actor activities, including presumed intent andhistorically observed behaviour, for the purpose ofascertaining the current threats that could be exploited. Inthis paper, we use ML techniques to learn dataset andpredict which CSC nodes have detection or no detection. The purpose is to predict which modes are venerable tocyberattacks and for predicting future trends. Todemonstrate the applicability of our approach, we used adataset from Microsoft Malware Prediction website. Further, an ensemble is used to link Logistic Regression, and Decision Tree and SVM algorithms in Majority Votingand run on the training data and then use 10-fold crossvalidation to test the parameter estimation, accurate resultsand predictions. The results show that ML algorithms inDecision Trees methods can be used in cyber supply chainpredict analytics to detect and predict future cyber attacktrends.