Processing math: 100%
Mulugeta, Dagmawi, Ben Goodman, and Steven Weber. 2022. “Security Posture-Based Incident Forecasting.” Variance 15 (1).
Download all (26)
  • Figure 1. Internet-facing and private network segments of an organization
  • Figure 2. Contemporary approach in problem domain: collect victim and nonvictim organizations, attribute their assets, and compare rules that discern victim configurations
  • Figure 3. Novel contributions to the contemporary approach
  • Figure 4. Pipeline collects victim and nonvictim data to map, manage, and extract features from their assets
  • Figure 5. Victim organization collection pipeline
  • Figure 6. Nonvictim organization collection pipeline
  • Figure 7. Host collection stage using Censys (Durumeric et al. 2015)
  • Figure 8. Feature engineering stage to extract features from 26 protocols
  • Figure 9. Challenge with the experimental setup: Features and target label at different levels
  • Figure 10. Isolation forest (Liu, Ting, and Zhou 2008): Isolating xi (left) and xo (right)
  • Figure 11. Isolation forest (Liu, Ting, and Zhou 2008): Average depths converge
  • Figure 12. Outlier versus inlier classification ROC curve
  • Figure 13. Outlier versus inlier classification for different-sized organizations
  • Figure 14. Host classification using outlier and inlier hosts
  • Figure 15. Randomly sampled nonvictim versus victim host classification using all attributions: (a) DNS inliers; (b) DNS outliers; (c) CERT inliers; (d) CERT outliers; (e) SEC500 inliers; (f) SEC500 outliers
  • Figure 16. Organization classification using the probability distributions from outlier and inlier classifications
  • Figure 17. Victim versus nonvictim organization classification using all attributions: (a) DNS, (b) CERT, (c) SEC500
  • Figure 18. Outlier versus inlier classification feature importance chart using all attributions
  • Figure 19. Outlier versus inlier classification feature importance chart using only certificate attributions
  • Figure 20. Victim versus nonvictim inlier host classification using all attributions
  • Figure 21. Victim versus nonvictim inlier host classification using only certificate attributions
  • Figure 22. Victim versus nonvictim outlier host classification using all attributions
  • Figure 23. Victim versus nonvictim outlier host classification using only certificate attributions
  • Figure 24. Victim versus nonvictim organization classification using all attributions
  • Figure 25. Victim versus nonvictim organization classification using only certificate attributions
  • Figure 26. Liu et al. (2015) model performance of separate features

Abstract

The frequency and impact of cybersecurity incidents increases every year, with data breaches, often caused by malicious attackers, among the most costly, damaging, and pervasive. Although our ability to quantify this risk for organizations remains frustratingly low, the cyber insurance industry has grown rapidly over the past several years and is expected to continue this growth into the foreseeable future, elevating the importance of developing new techniques for organizational risk assessment. This paper presents a method of utilizing machine learning to conduct security posture-based forecasting which offers certain improvements over current methods of establishing the probability of cybersecurity incidents. Furthermore, we introduce a novel method of building a network configuration-centric feature space while reducing both the data space and the processing cost of this sort of analysis.

Accepted: November 23, 2020 EDT