TY - GEN
T1 - Forecast techniques for predicting increase or decrease of attacks using bayesian inference
AU - Ishida, Chie
AU - Arakawa, Yutaka
AU - Sasase, Iwao
AU - Takemori, Keisuke
PY - 2005
Y1 - 2005
N2 - The analysis techniques of intrusion detection system (IDS) events are actively researched, since it is important to understand attack trends and devise countermeasures against incidents. To aim at a quick response in security operation, it is necessary to forecast a fluctuation of attacks. However, there is no approach for predicting the fluctuation of attacks, since the fluctuation of attacks seems to be random. In this paper, we propose forecast techniques for predicting increase or decrease of the attacks by using the Bayesian Inference for calculating the conditional probability based on past-observed event, counts. We consider two algorithms by focusing on an attack cycle and a fluctuation range of the event counts. We implement a forecasting system and evaluate it with real IDS events. As a result, our proposed technique can forecast increase or decrease of the event counts, and be effective to various types of attacks.
AB - The analysis techniques of intrusion detection system (IDS) events are actively researched, since it is important to understand attack trends and devise countermeasures against incidents. To aim at a quick response in security operation, it is necessary to forecast a fluctuation of attacks. However, there is no approach for predicting the fluctuation of attacks, since the fluctuation of attacks seems to be random. In this paper, we propose forecast techniques for predicting increase or decrease of the attacks by using the Bayesian Inference for calculating the conditional probability based on past-observed event, counts. We consider two algorithms by focusing on an attack cycle and a fluctuation range of the event counts. We implement a forecasting system and evaluate it with real IDS events. As a result, our proposed technique can forecast increase or decrease of the event counts, and be effective to various types of attacks.
UR - http://www.scopus.com/inward/record.url?scp=33746813204&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33746813204&partnerID=8YFLogxK
U2 - 10.1109/PACRIM.2005.1517323
DO - 10.1109/PACRIM.2005.1517323
M3 - Conference contribution
AN - SCOPUS:33746813204
SN - 0780391950
SN - 9780780391956
T3 - IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings
SP - 450
EP - 453
BT - 2005 IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing, PACRIM - Proceedings
T2 - 2005 IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing, PACRIM
Y2 - 24 August 2005 through 26 August 2005
ER -