Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14610%2F20%3A00115382" target="_blank" >RIV/00216224:14610/20:00115382 - isvavai.cz</a>
Result on the web
<a href="https://dl.acm.org/doi/10.1145/3386250" target="_blank" >https://dl.acm.org/doi/10.1145/3386250</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1145/3386250" target="_blank" >10.1145/3386250</a>
Alternative languages
Result language
angličtina
Original language name
Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach
Original language description
Cybersecurity adopts data mining for its ability to extract concealed and indistinct patterns in the data, such as for the needs of alert correlation. Inferring common attack patterns and rules from the alerts helps in understanding the threat landscape for the defenders and allows for the realization of cyber situational awareness, including the projection of ongoing attacks. In this paper, we explore the use of data mining, namely sequential rule mining, in the analysis of intrusion detection alerts. We employed a dataset of 12 million alerts from 34 intrusion detection systems in 3 organizations gathered in an alert sharing platform, and processed it using our analytical framework. We execute the mining of sequential rules that we use to predict security events, which we utilize to create a predictive blacklist. Thus, the recipients of the data from the sharing platform will receive only a small number of alerts of events that are likely to occur instead of a large number of alerts of past events. The predictive blacklist has the size of only 3 % of the raw data, and more than 60 % of its entries are shown to be successful in performing accurate predictions in operational, real-world settings.
Czech name
—
Czech description
—
Classification
Type
J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database
CEP classification
—
OECD FORD branch
10200 - Computer and information sciences
Result continuities
Project
<a href="/en/project/EF16_019%2F0000822" target="_blank" >EF16_019/0000822: CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2020
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
ACM Transactions on Management Information Systems
ISSN
2158-656X
e-ISSN
2158-6578
Volume of the periodical
11
Issue of the periodical within the volume
4
Country of publishing house
US - UNITED STATES
Number of pages
16
Pages from-to
1-16
UT code for WoS article
000596729500003
EID of the result in the Scopus database
2-s2.0-85096850466