USA Patriotism! ... "Showcasing Pride of America"USA Store! ... American / Patriotic themed gift products at USA Patriotism!

Home - Articles - Heroes - Photos - Poems - Stories - Students - Music - Videos
Quotes - Speeches - References - Great Patriots - Honor Halls - Stars for Troops
USA's Birth - New Content
- About - Contact - Press
- CureNow - Donate
- Privacy

Click To Google Search USA Patriotism!
USA Patriotism! YouTube ChannelJoin / Like the USA Patriotism! Facebook pagePinterestLinkedInUSA Patriotism! On TwitterUSA Patriotism! at Flickr

Patriotic Article
Military

Collectibles, apparel, and other gifts ... for Marines, Soldiers, Airmen, Sailors, and veterans! Checks with USA, military, and other patriotic designs Free Gifts from The Bradford Exchange Online

Army Model Predicts Number Of 'Piercing' Cyber Attacks
by U.S. Army T'Jae Ellis, Army Research Laboratory
October 23, 2017

Satute of Liberty / Flag Mugs and Steins

USA, military, and other patriotic themed pullover and button down Polo shirts

SunSetter 20' Telescoping Flagpole with Free American Flag

Tough Tex American Flags

"Mere Chance" by David G. Bancroft

A new study from the U.S. Army Research Laboratory presents evidence that the number of cyber intrusions can be predicted, particularly when analysts are already observing activities on a company or government organization's computer network.

Researchers say new models that predict the number of intrusions would be of significant value to providers of cyber security and resilience services.

Army model predicts number of Cyber Attacks that pierce company networks. (U.S. Army image by Jhi Scott, Army Research Laboratory, September 2017)
Army model predicts number of Cyber Attacks that pierce company networks. (U.S. Army image by Jhi Scott, Army Research Laboratory, September 2017)

Dr. Nandi O. Leslie was part of the team that studied empirical data on actual successful cyber intrusions committed against a number of different organizations. These data were obtained from a provider of cyber defense services, which defended those organizations as clients.

The researchers were able to determine the correlation -- or lack thereof -- between the number of successful intrusions and observed features of an organization, for 41 organizations. The team looked at the security incident reports containing detailed information about malicious activities and computer security policy violations by users and operators; DNS traffic, collected with specialized and open source software for all organizations in this study; and other data sources describing a selected subset of features of each organization's network topology and cyber footprint. As a result, the researchers were able to propose four generalized linear models (GLMs) to predict the number of successful cyber intrusions into an organization's computer network, where the rate at which intrusions occur is a function of several observable characteristics of the organization.

Additionally, they analyzed regression results for adequacy of fit to the intrusions data. Among their key findings is that one of these models -- the generalization of the Poisson regression model to the negative binomial GLM model -- predicts the response variable appreciably better than others. They also demonstrate that the intrusions data exhibit sufficient regularity (in statistical sense), and the construction of a practically useful predictive model is feasible, said Leslie of ARL's Network Security Branch.

The key research question -- which of the initially conjectured predictor variables should be included in the model -- brought rather surprising findings, Leslie said.

"Several of the predictor variables that were recommended to the researchers by subject matter experts turned out to be lacking in influence or even misleading. For example, SMEs felt that the extent to which an organization is visible on the Internet, as measured for example by the number of records found related to that organization on the popular Google Scholar, would be a significant predictor of intrusion frequency. However, it turned out that such visibility alone is not a useful predictor of successful intrusions," Leslie said.

Yet another variable that the SMEs expected to be influential--the number of hosts within an organization's network--also turns out to be a less significant predictor for the NB GLMs than hypothesized by SMEs.

On the other hand, the researchers show that the number of violations of an organization's internal cyber security policies is a strong predictor of the number of intrusions.

"This finding is rather intuitive. Indeed, if users such as employees of the organization lack the discipline or knowledge to comply with organizational cyber hygiene policies, and if the organization is unable or unwilling to enforce its own policies, it is easy to expect that the organization's cyber defenses are poor, leading to more frequent intrusions. Less intuitive is the finding that the frequency of accesses by the organization's networks to the domains domestic.net and foreign.net are strong predictors of intrusions. Although it is not entirely clear why this should be the case, the researchers offer a possible explanation," Leslie said.

Among client organizations, the numbers of intrusions differ dramatically by many orders of magnitude. Some organizations experience a large number of intrusions in a given time frame, whereas others may not experience any intrusions for a number of years. A specialized organization, such as a managed security service provider, is often used by an organization to provide cyber defense services. For a MSSP, the costs of doing business are heavily influenced by the number of intrusions experienced by its clients. Therefore, when a MSSP negotiates its fees with a new prospective client, it needs a model to estimate how many intrusions should be expected over some fixed time period.

Another example where such a model would be of high value is its use for actuarial purposes. In a broader sense, a model of this nature contributes to our fundamental understanding of cyber situational awareness and ways to monitor, quantify, and manage cyber risk. Finally, a model of this nature may offer clues toward enhancing the security posture and perhaps the design and operation of an organization's computing systems and networks. If the model indicates that certain characteristics are associated with an increased number of intrusions, the organization might be able to find ways to modify those characteristics.

This research is presented in a paper "Statistical models for the number of successful cyber intrusions", by Nandi O. Leslie, Richard E. Harang, Lawrence P. Knachel and Alexander Kott; the paper is to appear in a special issue of the Journal of Defense Modeling and Simulation in 2018.

--------------------------------

The U.S. Army Research Laboratory, currently celebrating 25 years of excellence in Army science and technology, is part of the U.S. Army Research, Development and Engineering Command, which has the mission to provide innovative research, development and engineering to produce capabilities that provide decisive overmatch to the Army against the complexities of the current and future operating environments in support of the joint warfighter and the nation. RDECOM is a major subordinate command of the U.S. Army Materiel Command.

By U.S. Army T'Jae Ellis, Army Research Laboratory
Provided through DVIDS
Copyright 2017

Comment on this article

USA Gifts Store! ... over 1,000 American / Patriotic themed products at USA Patriotism! USA / Americana theme ... polo shirts, t-shirts, shorts, hats, caps, swimwear, sweatshirts, hoodies, hats, jackets, under garments, and other apparel items American Pride: Poems Honoring America and Her Patriots! by David G. Bancroft