Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefit from information on potential aggressive attack sources, as such information can help to proactively defend their networks. For this purpose, several large-scale information sharing systems have been established, in which information on cyberattacks targeting each participant network is shared such that a network can be forewarned of attacks observed by others.
However, the total number of reported attackers is huge in these systems. Thus, a challenging problem is to identify the attackers that are most relevant to each individual network (i.e. most likely to come to that network in the near future). We present a framework to estimate the relevance of each attacker with respect to each network. In particular, we model each attacker's relevance as a function over the networks. Different attackers have different functions. The distribution of the functions is modeled using a Gaussian process (GP). The relevance function of each attacker is then inferred from the GP, that itself is learned from the collection of attack information. We test our framework on the attack reports in the DShield information sharing system. Experiments show that attackers found relevant to a network by our framework are indeed more likely to come to that network in the future. Copyright © 2009 Wiley Periodicals, Inc. Statistical Analysis and Data Mining 3: 56-68, 2010
The majority of the work was done while the author was working at SRI International.
[1]
Carl E. Rasmussen,et al.
In Advances in Neural Information Processing Systems
,
2011
.
[2]
David B. Dunson,et al.
Bayesian Data Analysis
,
2010
.
[3]
Joseph L Schafer,et al.
Analysis of Incomplete Multivariate Data
,
1997
.
[4]
Carl E. Rasmussen,et al.
Gaussian processes for machine learning
,
2005,
Adaptive computation and machine learning.
[5]
John Riedl,et al.
Item-based collaborative filtering recommendation algorithms
,
2001,
WWW '01.
[6]
Anton Schwaighofer,et al.
Learning Gaussian Process Kernels via Hierarchical Bayes
,
2004,
NIPS.
[7]
Carl E. Rasmussen,et al.
The Infinite Gaussian Mixture Model
,
1999,
NIPS.
[8]
David Barber,et al.
Bayesian Classification With Gaussian Processes
,
1998,
IEEE Trans. Pattern Anal. Mach. Intell..
[9]
John C. Platt,et al.
Learning a Gaussian Process Prior for Automatically Generating Music Playlists
,
2001,
NIPS.
[10]
David Heckerman,et al.
Empirical Analysis of Predictive Algorithms for Collaborative Filtering
,
1998,
UAI.
[11]
Balachander Krishnamurthy,et al.
Collaborating against common enemies
,
2005,
IMC '05.