基于节点推理技术的贝叶斯模型

N. Sharmin, Shanto Roy, Aron Laszka, Jaime Acosta, Chris Kiekintveld
{"title":"基于节点推理技术的贝叶斯模型","authors":"N. Sharmin, Shanto Roy, Aron Laszka, Jaime Acosta, Chris Kiekintveld","doi":"10.1109/SysCon53073.2023.10131168","DOIUrl":null,"url":null,"abstract":"Cyber attackers often use passive reconnaissance to collect information about target networks. This technique can be used to identify systems and plan attacks, making it an increasingly challenging task for security analysts to detect. Adversaries can recover statistical information from the information collected from compromised nodes, revealing target identities such as operating systems, software and servers. A comprehensive analysis of the collected data can aid in understanding what information an adversary can deduce from this technique. With this analysis, the defender can examine the methods of inferring a target used by adversaries and model adversaries’ inference techniques and belief formation. For this purpose, we propose a model-driven decision support system (DSS) based on a Bayesian belief network (BBN) to depict adversary node-based inference techniques from passively collected data and belief formation. BBN provides a compact representation of probabilistic data and allows the formalization of adversary beliefs. We demonstrate this approach with a case study based on the passively observed operating system (OS) fingerprinting data, which is evaluated utilizing p-value significance level and compared against the model generated from local networks and predictive accuracy. We also show that our methods produce models with high predictive accuracy surpassing a sequential artificial neural network (ANN).","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Bayesian Models for Node-Based Inference Techniques\",\"authors\":\"N. Sharmin, Shanto Roy, Aron Laszka, Jaime Acosta, Chris Kiekintveld\",\"doi\":\"10.1109/SysCon53073.2023.10131168\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber attackers often use passive reconnaissance to collect information about target networks. This technique can be used to identify systems and plan attacks, making it an increasingly challenging task for security analysts to detect. Adversaries can recover statistical information from the information collected from compromised nodes, revealing target identities such as operating systems, software and servers. A comprehensive analysis of the collected data can aid in understanding what information an adversary can deduce from this technique. With this analysis, the defender can examine the methods of inferring a target used by adversaries and model adversaries’ inference techniques and belief formation. For this purpose, we propose a model-driven decision support system (DSS) based on a Bayesian belief network (BBN) to depict adversary node-based inference techniques from passively collected data and belief formation. BBN provides a compact representation of probabilistic data and allows the formalization of adversary beliefs. We demonstrate this approach with a case study based on the passively observed operating system (OS) fingerprinting data, which is evaluated utilizing p-value significance level and compared against the model generated from local networks and predictive accuracy. We also show that our methods produce models with high predictive accuracy surpassing a sequential artificial neural network (ANN).\",\"PeriodicalId\":169296,\"journal\":{\"name\":\"2023 IEEE International Systems Conference (SysCon)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE International Systems Conference (SysCon)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SysCon53073.2023.10131168\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Systems Conference (SysCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SysCon53073.2023.10131168","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

网络攻击者通常使用被动侦察来收集目标网络的信息。该技术可用于识别系统和计划攻击,使其成为安全分析人员检测的越来越具有挑战性的任务。攻击者可以从从受损节点收集的信息中恢复统计信息,揭示目标身份,如操作系统、软件和服务器。对收集到的数据进行全面分析可以帮助理解对手可以从这种技术中推断出哪些信息。通过这种分析,防御者可以检查对手使用的推断目标的方法,并模拟对手的推断技术和信念形成。为此,我们提出了一种基于贝叶斯信念网络(BBN)的模型驱动决策支持系统(DSS),从被动收集的数据和信念形成中描述基于对手节点的推理技术。BBN提供了概率数据的紧凑表示,并允许对手信念的形式化。我们通过一个基于被动观察操作系统(OS)指纹数据的案例研究来证明这种方法,该数据利用p值显著性水平进行评估,并与本地网络和预测准确性生成的模型进行比较。我们还表明,我们的方法产生的模型具有比顺序人工神经网络(ANN)更高的预测精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Bayesian Models for Node-Based Inference Techniques
Cyber attackers often use passive reconnaissance to collect information about target networks. This technique can be used to identify systems and plan attacks, making it an increasingly challenging task for security analysts to detect. Adversaries can recover statistical information from the information collected from compromised nodes, revealing target identities such as operating systems, software and servers. A comprehensive analysis of the collected data can aid in understanding what information an adversary can deduce from this technique. With this analysis, the defender can examine the methods of inferring a target used by adversaries and model adversaries’ inference techniques and belief formation. For this purpose, we propose a model-driven decision support system (DSS) based on a Bayesian belief network (BBN) to depict adversary node-based inference techniques from passively collected data and belief formation. BBN provides a compact representation of probabilistic data and allows the formalization of adversary beliefs. We demonstrate this approach with a case study based on the passively observed operating system (OS) fingerprinting data, which is evaluated utilizing p-value significance level and compared against the model generated from local networks and predictive accuracy. We also show that our methods produce models with high predictive accuracy surpassing a sequential artificial neural network (ANN).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信