skip to main content
10.1145/3433174.3433614acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

CyberSecurity Attack Prediction: A Deep Learning Approach

Published: 01 February 2021 Publication History

Abstract

Cybersecurity attacks are exponentially increasing, making existing detection mechanisms insufficient and enhancing the necessity to design more relevant prediction models and approaches. This issue is still an open research problem since existing attack prediction models are failing to follow the huge amount of attacks and their variety. Recently, machine learning approaches and especially deep learning techniques have received much attention from researchers since their unparalleled high performance in several prediction-based fields. In this context, this paper explores the application of deep learning techniques for predicting cybersecurity attacks. Particularly, it proposes a new LSTM (Long Short-Term Memory), RNN (Recurrent Neural Network), and MLP (Multilayer Perceptron) based models carefully designed to predict the type of attack potentially to hap-pen. The proposed models were validated using a recently available dataset called CTF showing encouraging results especially for the LSTM model with an f-measure greater than 93%.

References

[1]
McCulloch, W.S., Pitts, W. A logical calculus of the ideas immanent in nervous activity. Bulletin of Mathematical Biophysics 5, 115–133 (1943). https://doi.org/10.1007/BF02478259
[2]
Y. Bengio, P. Simard, P. Frasconi, Learning long-term dependencies with gradient descent is difficult. IEEE Trans. Neural Netw. 5(2), 157–166 (1994)
[3]
S. Hochreiter, J. Schmidhuber, Long short-term memory. Neural Comput.9(8), 1735–1780 (1997)
[4]
Berman, Daniel S., "A survey of deep learning methods for cyber security." Information 10.4 (2019): 122.
[5]
Moustafa, Nour, Jiankun Hu, and Jill Slay. "A holistic review of Network Anomaly Detection Systems: A comprehensive survey." Journal of Network and Computer Applications 128 (2019): 33-55.
[6]
Aldweesh, Arwa, Abdelouahid Derhab, and Ahmed Z. Emam. "Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues." Knowledge-Based Systems 189 (2020): 105124.
[7]
Ansari Mohammad Samar, Vaclav Bartos, and Brian Lee. "Shallow and Deep Learning Approaches for Network Intrusion Alert Prediction." Procedia Computer Science 171 (2020): 644-653.
[8]
CESNET Association, WARDEN alert sharing system, retrieved on June 27, 2020. URL https://warden.cesnet.cz/en/index.
[9]
Bartos V, Zadnik M, Habib S.M., Vasilomanolakis E, Network entity characterization and attack prediction, Future Generation Computer Systems, 97 (2019), pp. 674-686
[10]
Shen, Yun, "Tiresias: Predicting security events through deep learning." Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018.
[11]
Wang, Junshe, "Network Attack Prediction Method Based on Threat Intelligence." International Conference on Cloud Computing and Security. Springer, Cham, 2018.
[12]
Vyawahare, Madhura, and Madhumita Chatterjee. "Survey on Detection and Prediction Techniques of Drive-by Download Attack in OSN." Advanced Computing Technologies and Applications. Springer, Singapore, 2020. 453-463.
[13]
Javed A, Burnap P, Rana O (2018) Prediction of drive-by download attacks on Twitter. Published by Elsevier Ltd. 12 Feb 2018.
[14]
Al-Qurishi, Muhammad, "A prediction system of Sybil attack in social network using deep-regression model." Future Generation Computer Systems 87 (2018): 743-753.
[15]
Fang, Xing, "A deep learning framework for predicting cyber attacks rates." EURASIP Journal on Information Security 2019.1 (2019): 5.
[16]
Sun, Nan, "Data-driven cybersecurity incident prediction: A survey." IEEE Communications Surveys & Tutorials 21.2 (2018): 1744-1772.
[17]
Husák, Martin, "Survey of attack projection, prediction, and forecasting in cyber security." IEEE Communications Surveys & Tutorials 21.1 (2018): 640-660.
[18]
https://www.defcon.org/, last accessed 06/20/2020
[19]
www.norton.com/‏‏, last accessed 06/20/2020
[20]
www.snort.org, last accessed 06/20/2020
[21]
Brockwell, P.J., Davis, R.A.: Time Series: Theory and Methods. Springer Science & Business Media, New York (2013)
[22]
Box, G.E., Jenkins, G.M., Reinsel, G.C., Ljung, G.M.: Time Series Analysis: Forecasting and Control. Wiley, Hoboken (2015)
[23]
Alireza Shameli Sendi, Michel Dagenais, Masoume Jabbarifar: Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model, JOURNAL OF NETWORKS, VOL. 7, NO. 2, FEBRUARY 2012
[24]
Seongjun Shin, Seungmin Lee, Hyunwoo Kim, Sehun Kim: Advanced probabilistic approach for network intrusion forecasting and detection, Expert Systems with Applications
[25]
Ahmet Okutan, Shanchieh Jay Yang, and Katie McConky. 2017. Predicting Cyber Attacks With Bayesian Networks Using Unconventional Signals. In Proceedings of Cyber and Information Security Research (CISR) Conference, Oak Ridge, TN, USA, April 04-06, 2017 (CISRC ’17)

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN 2020: 13th International Conference on Security of Information and Networks
November 2020
220 pages
ISBN:9781450387514
DOI:10.1145/3433174
© 2020 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 February 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Attack prediction
  2. cybersecurity
  3. deep learning techniques

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

SIN 2020

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)228
  • Downloads (Last 6 weeks)17
Reflects downloads up to 01 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media