首页> 外文会议>IEEE Security and Privacy Workshops >Machine Learning Based Approach for the Automated Mapping of Discovered Vulnerabilities to Adversial Tactics
【24h】

Machine Learning Based Approach for the Automated Mapping of Discovered Vulnerabilities to Adversial Tactics

机译:基于机器学习的漏洞自动映射对逆境策略的自动化方法

获取原文

摘要

To defend networks against security attacks, cyber defenders have to identify vulnerabilities that could be exploited by an attacker and fix them. However, vulnerabilities are constantly evolving and their number is rising. In addition, the resources required (i.e., time and cost) to patch all the identified vulnerabilities and update the affected assets are not always affordable. For these reasons, the defender needs to have a set of metrics that could be used to automatically map new discovered vulnerabilities to potential attack tactics. Using such a mapping to attack tactics, will allow security solutions to better respond inline to any vulnerabilities exploitation tentatives, by selecting and prioritizing suitable response strategy. In this work, we provide a multilabel classification approach to automatically map a detected vulnerability to the MITRE Adversarial Tactics that could be used by the attacker. The proposed approach will help cyber defenders to prioritize their defense strategies, ensure a rapid and efficient investigation process, and well manage new detected vulnerabilities. We evaluate a set of machine learning algorithms (BinaryRelevance, LabelPowerset, ClassifierChains, MLKNN, BRKNN, RAkELd, NLSP, and Neural Networks) and found out that ClassifierChains with RandomForest classifier is the best method in our experiment.
机译:为了防御安全攻击,网络防御者必须识别可能被攻击者利用并修复它们的漏洞。但是,漏洞不断发展,他们的数量正在上升。此外,要修补所有已识别的漏洞和更新受影响资产的所需资源(即时间和成本)并不总是经济实惠的。由于这些原因,后卫需要有一系列可用于自动将新发现的漏洞映射到潜在攻击策略的指标。使用这种映射来攻击策略,将允许安全解决方案通过选择和优先考虑合适的响应策略来更好地响应任何漏洞临近临近的漏洞。在这项工作中,我们提供了一种多标签分类方法,以自动映射到攻击者可以使用的初步侵略性战术的检测到的脆弱性。拟议的方法将有助于网络防御者优先考虑其防御战略,确保快速高效的调查过程,并管理新的检测到的漏洞。我们评估一组机器学习算法(BinaryRelevance,LabelPowerset,分类,MLKNN,BRKNN,Rakeld,NLSP和神经网络),发现具有随机侵索的分类器是我们实验中最好的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号