SlideShare a Scribd company logo
By Craig S Wright,  DTh LLM (Cand.) MNSA MMIT CISA CISM CISSP ISSMP ISSAP G7799 GCFA CCE  MSDBA AFAIM MACS And a partridge in a pear tree… A QUANTITATIVE TIME SERIES ANALYSIS OF MALWARE AND VULNERABILITY TRENDS
Who Am I Senior IS Audit Manager - BDO My Specialties ISMS, ISO 7799 Consulting and Audit/Review Digital Forensics Information Security Design and Review Threat/Risk Analysis and Review Information Risk and Management (ANZ4360) Data Mining Neural Networks Anomaly Detection Systems CAATS Technology Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) Cryptography Craig S Wright,  DTh LLM (Cand.) MNSA MMIT CISA CISM CISSP ISSMP ISSAP G7799 GCFA CCE  MSDBA AFAIM MACS And a partridge in a pear tree…
Today’s Presentation To effectively protect against attacks to the computers systems and network architecture, we need to understand the threats and to be able to create predictive models for them.
A Quantitative Time Series Analysis of Malware and Vulnerability Trends Introduction and objectives The creation of Quantitative Risk models in Information Systems Security is a field in its infancy.  The prediction of threats is oft touted as being too difficult due to a shortage of data and the costs associated with collecting an analysing data for a site.
Research Design / Methods / Data Collection  It has been deduced that three main problems exist within the analytical process involved with Information Systems security (Valentino, 2003): utilising all available information sources, verifying the validity of a suspected computer system intrusion, and following a standard process.
Research Data Sources The Wildlist organisation Virus Bulletin Vendor Virus bulletins  Vendor vulnerability announcements CERT
ARIMA techniques for time-series analysis  Three sets of data have been collected for analysis. These consist of: The reported monthly Virus Incidents (Virus.No), The numbers of infections/incidents associated with the most prevent malware in the month (Top.Mth), and  The Wildlist collated monthly data for malware reported “in the wild” (Wild.Lst).
Initial observations  Visual analysis alone is sufficient to see that trends in malicious code incidents have increased significantly over the last 3 years in a non-linear manner.
Wildlist Trends It is clear that there is a trend and that the variance increases with the mean.
A logarithmic transform was selected for the three datasets  There is a clear trend with all three sets of data with the number of malicious code incidents increasing over time. The trends are all roughly linear (particularly the Wildlist data), but it is difficult to be sure in the presence of the other features.
Analysis of Wildlist Data A Timeplot of d=1 of the logarithm for the Wildlist data shows that the series is stationary after taking one difference. There appears to be no seasonality with this timeseries.
Wildlist ACF
Wildlist Partial ACF
Inspection of the ACF PACF Plots The ACF/PACF plots suggested that either an AR (1) or MA (1) model for the differenced series may be suitable.  Taking the log transformed differenced values (d=1), the ACF plot decreases exponentially to zero and the PACF plot is significant at lag 1.
Model Comparison -685.5491 0.985 -675.5562 -681.5908 0.010813 149 IMA(1, 2) No Intercept  -685.5822 0.985 -675.5899 -681.6245 0.0108106 149 ARI(2, 1) No Intercept  -685.5343 0.985 -680.5581 -683.5753 0.010742 150 IMA(1, 1) No Intercept  -685.3136 0.985 -680.3351 -683.3524 0.0107579 150 ARI(1, 1) No Intercept  -2LogLH RSquare SBC AIC Variance DF Model
Model Selection Over-fitting either model gave back values of the coefficients that where not significant at the p-value < 5%.  The diagnostic plots for each model produced no significant values within the residual plots and we could see no evidence of inadequacy for either model.
Comparison of forecasts To see if there was any important difference in the models in terms of the aim of the analysis (forecasting), forecasts and forecast intervals were computed to a time of the last 5 months to May 2006.
Comparison of forecasts ARI models where tested.  No significant differences where found between the two models and all forecast data were contained in the predicted confidence intervals.
Analysis of Virus Incidents  The analysis is focused on the overall pattern of malware incidents reported monthly. A side comparison of the number of incidents which are attributable to the most prevalent malware varietals has also been undertaken.
 
Analysis of Virus Incidents  It is clear from the plot of the two variables alone that the most prevalent malware varietals follows a similar pattern to the total number of incidents and that the two functions are becoming more closely correlated over time.  This would indicate that individual computer viruses and worms are having a greater impact individually.
Analysis of Virus Incidents  The trend is thus that fewer numbers of malicious code types are causing more damage. In the past a large number of virus types where generally acting at any given time.  The trend is towards greater effects by specific malicious code samples.
ACF
PACF
Model Comparison -79.10179 0.908 -55.38593 -69.83768 0.5700881 128 ARI(5, 1) No Intercept  -74.54214 0.904 -55.46153 -67.02293 0.5865218 129 ARI(4, 1) No Intercept -2LogLH RSquare SBC AIC Variance DF Model
ARI (5, 1) Model Model: ARI (5, 1) Parameter Estimates 0.0326 -2.16 0.0973837 -0.2103974 5 AR5 0.0003 -3.74 0.0965763 -0.3610897 4 AR4 0.0025 -3.09 0.0883067 -0.272786 3 AR3 0.0235 -2.29 0.0887335 -0.2034253 2 AR2 <.0001 -4.57 0.0850698 -0.3886438 1 AR1 Prob>|t| t Ratio Std Error Estimate Lag Term
The residual plot of the ARI (5, 1) model for the fitted value v the actual value shows no recognisable pattern
Tests of the model The residual plot of the ARI (5, 1) model for the fitted value v the actual value shows no recognisable pattern.  A Normal Q-Q plot of the residuals shows that the residuals are near to normal, though they are slightly skewed.  None of the values seem to be extreme outliers however and have not been excluded.
Prediction
The  ARI (5, 1) model supports predictions for the  5 month period with all the observed values falling into the confidence limits  Forecast Values
Findings The threat is not abating! It also seems that the industry is not keeping up with the threat.  Further research into why this is occurring to assess the future levels of threats should be conducted
Where this can lead The results demonstrate that time series analysis is a valid method of predicting trends in malicious code incidents.  The results have applications to operational risk in general and further development of models and risk engines is warranted from the findings.
Further Research Further research into frequency domain analysis is expected to aide in the determination of patterns in past threat frequencies. Analysis of vulnerability data using stochastic point-process models to gain more insight into the mechanistic nature of the time series and how it is affected through the changing nature and evolution of the Malware varietals would also be expected to produce significant findings.
To Conclude It is feasible to use ARIMA models to forecast short-term malware trends.  The numbers of incidents are modelled and the incident data are input into the software package for future analysis.  Monthly trend patterns may be derived from statistic procedure.
Thank You Thank you for your time
Bibliography  Or a day in the life of an academic junkie… Berman (1992) “Sojourns and Extremes of Stochastic Processes”, Wadsworth. Box, P., Jenkins, G. (1976) “Time-Series Analysis”, Rev. Ed. Holden-Day, US Bridwell, L.M. & Tibbet, P. (2000) “Sixth annual ICSA Labs Computer Virus Prevalance Survey 2000”, ICSA Labs US Brillinger, David (1975) “Time Series: Data Analysis and Theory (context)” Priestley  Brockwell, P.J. & Davis, R.A. (1991). “ITSM: An Interactive Time Series Modelling Package for the PC”, Springer-Verlag. New York Brockwell, P.J. & Davis, R.A. (1991) “Time series: Theory and Methods”, Springer-Verlag. Brockwell, P.J., & Davis, R.A. (1996) “Introduction to Time Series and Forecasting”, 1996, Springer Brown , Lawrence D. (2003) “Estimation and Prediction in a Random Effects Point-process Model Involving Autoregressive Terms” Statistics Department, U. of Penn. Butler, S.A. (2001), “Improving Security Technology Selections with Decision Theory”. Emerald Cox, D. R, & Isham, V., (1985) “Point Processes”, Chapman & Hall. Cox, D. & Miller, H. (1965) “The Theory of Stochastic Processes”. Chapman and Hall, London, 1965. Chatfield, C. (1996) “The Analysis of Time Series : An Introduction”. 5th Ed, Chapman and Hall Chen, Z., Gao, L. & Kwiat. K, (2003) “Modeling the spread of active worms”. In IEEE INFOCOM Coulthard, A. Vuori, T. A. (2002) “Computer Viruses: a quantitative analysis” Logistics Information Management, Volume 15, Number 5/96, 2002 pp 400-409 Figueiredo Daniel R., Liu, Benyuan, Misra, Vishal, & Towsley, Don (200) “On the autocorrelation structure of TCP traffic”, Department of Computer Science, University of Massachusetts, Amherst, MA 01003-9264, USA, 2002 Elsevier Science B.V. Forgionne, G.A. (1999), “Management Science”, Wiley Custom Services, USA. Giles. K.E. (2004) “On the spectral analysis of backscatter data”. In GMP - Hawai 2004, URL:http://www.mts.jhu.edu/ priebe/FILES/-gmp hawaii04.pdf. Garetto, M., Gong, W., Towsley, D., (2003) “Modeling Malware Spreading Dynamics,” in Proc. of INFOCOM 2003, San Francisco, April, 2003. Harder, Uli, Johnson, Matt W., Bradley, Jeremy T. & Knottenbelt William J. (200x)  “Observing Internet Worm and Virus Attacks with a Small Network Telescope”, Department of Computing, Imperial College London, South Kensington Campus, London SW7 2AZ, United Kingdom Electronic Notes in Theoretical Computer Science Hipel, K. W., & A.I. McLeod, A. I., (1994) “Time Series Modelling of Water Resources and Environmental Systems”, Elsevier, Amsterdam Kephart, J. O. & White, S. R. (1993) “Measuring and Modeling Computer Virus Prevalence”, Proc. of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 2-15, May. 1993 Leadbetter, M.R., Lindgren, G. and Rootzen, H. (1983) “Extremes and Related Properties of Random Sequences and Processes”. Springer. Berlin. Pouget, F., Dacier, M., & Pham V.H. (200) “Understanding Threats: a Prerequisite to Enhance Survivability of Computing Systems” Institut Eur_ecom B.P. 193, 06904 Sophia Antipolis, FRANCE Rohloff, K., & Basar, T., (2005) “Stochastic Behaviour of Random Constant Scanning Worms,” in Proc. of IEEE Conference on Computer Communications and Networks 2005 (ICCCN 2005), San Diego, CA, Oct., 2005. Spafford, Eugene (1989) “The Internet Worm: Crisis and Aftermath” Communications of the ACM 32, 6 pp.678-687 June 1989 Shumway, R. H & Stoffer, D.S, (2000), “Time Series Analysis and its Applications, Springer-Verlag New York Tong (1990) “Non-linear Time Series: A Dynamical Systems Approach”, Oxford Univ. Press. Valentino, Christopher C. (2003) “Smarter computer intrusion detection utilizing decision modelling” Department of Information Systems, The University of Maryland, Baltimore County, Baltimore, MD, USA Yegneswaran, V., Barford, P., & Ullrich J. (2003) “Internet Intrusions: Global Characteristics and Prevalence”, SIGMETRICS 2003. Zou, C. C., Gong, W., & Towsley, D. (2003) “Worm propagation modelling and analysis under dynamic quarantine defense”. In ACM WORM 03, October 2003. Zou, C. C., Gong, W., Towsley, D., & Gao, L., (2005) “The Monitoring and Early Detection of Internet Worms,” IEEE/ACM Transactions on Networking, 13(5), 961- 974, October 2005. Zou, C. C., Gong, W., & Towsley, D. (2003) “Monitoring and Early Warning for Internet Worms”, Umass ECE Technical Report TR-CSE-03-01, 2003. Zou, C. C., Gong, W., & Towsley, D. “On the Performance of Internet Worm Scanning Strategies,” to appear in Journal of Performance Evaluation.
Ad

More Related Content

Viewers also liked (20)

Carbon chemisrty
Carbon chemisrtyCarbon chemisrty
Carbon chemisrty
vijanriya
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
solarisyourep
 
rtsp
rtsprtsp
rtsp
Rakesh Sundru
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
Rod Davis
 
Hexawise Software Test Design Tool - "Vendor Meets User" at CAST Software Tes...
Hexawise Software Test Design Tool - "Vendor Meets User" at CAST Software Tes...Hexawise Software Test Design Tool - "Vendor Meets User" at CAST Software Tes...
Hexawise Software Test Design Tool - "Vendor Meets User" at CAST Software Tes...
Justin Hunter
 
R data mining-Time Series Analysis with R
R data mining-Time Series Analysis with RR data mining-Time Series Analysis with R
R data mining-Time Series Analysis with R
Dr. Volkan OBAN
 
Qualitative analysis sheet for o level chemistry
Qualitative analysis sheet for o level chemistryQualitative analysis sheet for o level chemistry
Qualitative analysis sheet for o level chemistry
alsal ALI SULEIMAN ALI
 
Qualitative analysis 1
Qualitative analysis 1Qualitative analysis 1
Qualitative analysis 1
Mark Selby
 
Chapter 5 ( some discrete probability distributions 21 april, 2014)
Chapter 5 ( some discrete probability distributions  21 april, 2014)Chapter 5 ( some discrete probability distributions  21 april, 2014)
Chapter 5 ( some discrete probability distributions 21 april, 2014)
Rana Ehtisham Ul Haq
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
Eagle Technologies
 
Pros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed ServicesPros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed Services
Eagle Technologies
 
Green analytical chemistry
Green analytical chemistryGreen analytical chemistry
Green analytical chemistry
Nabeel B Azeez
 
Hamilton 1994 time series analysis
Hamilton 1994 time series analysisHamilton 1994 time series analysis
Hamilton 1994 time series analysis
Ozan Baskan
 
LeanUX: Online Design of Experiments
LeanUX: Online Design of ExperimentsLeanUX: Online Design of Experiments
LeanUX: Online Design of Experiments
Sigma Consulting Resources, LLC
 
ANALYTICAL CHEMISTRY IN FORENSIC SCIENCE
ANALYTICAL CHEMISTRY IN FORENSIC SCIENCEANALYTICAL CHEMISTRY IN FORENSIC SCIENCE
ANALYTICAL CHEMISTRY IN FORENSIC SCIENCE
Pradeep Jaiswal
 
Exploring Best Practises in Design of Experiments: A Data Driven Approach to ...
Exploring Best Practises in Design of Experiments: A Data Driven Approach to ...Exploring Best Practises in Design of Experiments: A Data Driven Approach to ...
Exploring Best Practises in Design of Experiments: A Data Driven Approach to ...
JMP software from SAS
 
Exploring Best Practises in Design of Experiments
Exploring Best Practises in Design of ExperimentsExploring Best Practises in Design of Experiments
Exploring Best Practises in Design of Experiments
JMP software from SAS
 
Design of Experiments
Design of ExperimentsDesign of Experiments
Design of Experiments
Ronald Shewchuk
 
NG BB 47 Basic Design of Experiments
NG BB 47 Basic Design of ExperimentsNG BB 47 Basic Design of Experiments
NG BB 47 Basic Design of Experiments
Leanleaders.org
 
ML on Big Data: Real-Time Analysis on Time Series
ML on Big Data: Real-Time Analysis on Time SeriesML on Big Data: Real-Time Analysis on Time Series
ML on Big Data: Real-Time Analysis on Time Series
Sigmoid
 
Carbon chemisrty
Carbon chemisrtyCarbon chemisrty
Carbon chemisrty
vijanriya
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
solarisyourep
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
Rod Davis
 
Hexawise Software Test Design Tool - "Vendor Meets User" at CAST Software Tes...
Hexawise Software Test Design Tool - "Vendor Meets User" at CAST Software Tes...Hexawise Software Test Design Tool - "Vendor Meets User" at CAST Software Tes...
Hexawise Software Test Design Tool - "Vendor Meets User" at CAST Software Tes...
Justin Hunter
 
R data mining-Time Series Analysis with R
R data mining-Time Series Analysis with RR data mining-Time Series Analysis with R
R data mining-Time Series Analysis with R
Dr. Volkan OBAN
 
Qualitative analysis sheet for o level chemistry
Qualitative analysis sheet for o level chemistryQualitative analysis sheet for o level chemistry
Qualitative analysis sheet for o level chemistry
alsal ALI SULEIMAN ALI
 
Qualitative analysis 1
Qualitative analysis 1Qualitative analysis 1
Qualitative analysis 1
Mark Selby
 
Chapter 5 ( some discrete probability distributions 21 april, 2014)
Chapter 5 ( some discrete probability distributions  21 april, 2014)Chapter 5 ( some discrete probability distributions  21 april, 2014)
Chapter 5 ( some discrete probability distributions 21 april, 2014)
Rana Ehtisham Ul Haq
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
Eagle Technologies
 
Pros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed ServicesPros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed Services
Eagle Technologies
 
Green analytical chemistry
Green analytical chemistryGreen analytical chemistry
Green analytical chemistry
Nabeel B Azeez
 
Hamilton 1994 time series analysis
Hamilton 1994 time series analysisHamilton 1994 time series analysis
Hamilton 1994 time series analysis
Ozan Baskan
 
ANALYTICAL CHEMISTRY IN FORENSIC SCIENCE
ANALYTICAL CHEMISTRY IN FORENSIC SCIENCEANALYTICAL CHEMISTRY IN FORENSIC SCIENCE
ANALYTICAL CHEMISTRY IN FORENSIC SCIENCE
Pradeep Jaiswal
 
Exploring Best Practises in Design of Experiments: A Data Driven Approach to ...
Exploring Best Practises in Design of Experiments: A Data Driven Approach to ...Exploring Best Practises in Design of Experiments: A Data Driven Approach to ...
Exploring Best Practises in Design of Experiments: A Data Driven Approach to ...
JMP software from SAS
 
Exploring Best Practises in Design of Experiments
Exploring Best Practises in Design of ExperimentsExploring Best Practises in Design of Experiments
Exploring Best Practises in Design of Experiments
JMP software from SAS
 
NG BB 47 Basic Design of Experiments
NG BB 47 Basic Design of ExperimentsNG BB 47 Basic Design of Experiments
NG BB 47 Basic Design of Experiments
Leanleaders.org
 
ML on Big Data: Real-Time Analysis on Time Series
ML on Big Data: Real-Time Analysis on Time SeriesML on Big Data: Real-Time Analysis on Time Series
ML on Big Data: Real-Time Analysis on Time Series
Sigmoid
 

Similar to Quantitive Time Series Analysis of Malware and Vulnerability Trends (20)

Study of smart phone sensor based fall detection
Study of smart phone sensor based fall detectionStudy of smart phone sensor based fall detection
Study of smart phone sensor based fall detection
Md Kafiul Islam
 
Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT Group
CXT Group
 
CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2
Daksha Bhasker PEng (CIE), MBA CISM CISSP CCSK
 
AutoML-Based Framework for Optimization of Intrusion Detection Pipelines in N...
AutoML-Based Framework for Optimization of Intrusion Detection Pipelines in N...AutoML-Based Framework for Optimization of Intrusion Detection Pipelines in N...
AutoML-Based Framework for Optimization of Intrusion Detection Pipelines in N...
YashYeeswar
 
07 analysis of scada security models
07   analysis of scada security models07   analysis of scada security models
07 analysis of scada security models
omriyad
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
IRJET Journal
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection   Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection
khawla Osama
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
SubhashreddyPalleti
 
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINEINTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
IRJET Journal
 
Probabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network trafficProbabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network traffic
Alexander Decker
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
IJERA Editor
 
20170412 om patri pres 153pdf
20170412 om patri pres 153pdf20170412 om patri pres 153pdf
20170412 om patri pres 153pdf
International Society of Service Innovation Professionals
 
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion ApproachEnhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
IJCI JOURNAL
 
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
IAEME Publication
 
IRJET- A Prediction Engine for Influenza Pandemic using Healthcare Analysis
IRJET- A Prediction Engine for Influenza  Pandemic using Healthcare AnalysisIRJET- A Prediction Engine for Influenza  Pandemic using Healthcare Analysis
IRJET- A Prediction Engine for Influenza Pandemic using Healthcare Analysis
IRJET Journal
 
rpaper
rpaperrpaper
rpaper
imu409
 
AIM NIAC PNNL-SA-116502
AIM NIAC PNNL-SA-116502AIM NIAC PNNL-SA-116502
AIM NIAC PNNL-SA-116502
Mark Greaves
 
How do we detect malware? A step-by-step guide
How do we detect malware? A step-by-step guideHow do we detect malware? A step-by-step guide
How do we detect malware? A step-by-step guide
Marcus Botacin
 
50120130405032
5012013040503250120130405032
50120130405032
IAEME Publication
 
Spam email filtering
Spam email filteringSpam email filtering
Spam email filtering
National Institute
 
Study of smart phone sensor based fall detection
Study of smart phone sensor based fall detectionStudy of smart phone sensor based fall detection
Study of smart phone sensor based fall detection
Md Kafiul Islam
 
Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT Group
CXT Group
 
AutoML-Based Framework for Optimization of Intrusion Detection Pipelines in N...
AutoML-Based Framework for Optimization of Intrusion Detection Pipelines in N...AutoML-Based Framework for Optimization of Intrusion Detection Pipelines in N...
AutoML-Based Framework for Optimization of Intrusion Detection Pipelines in N...
YashYeeswar
 
07 analysis of scada security models
07   analysis of scada security models07   analysis of scada security models
07 analysis of scada security models
omriyad
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
IRJET Journal
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection   Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection
khawla Osama
 
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINEINTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
IRJET Journal
 
Probabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network trafficProbabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network traffic
Alexander Decker
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
IJERA Editor
 
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion ApproachEnhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
IJCI JOURNAL
 
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
IAEME Publication
 
IRJET- A Prediction Engine for Influenza Pandemic using Healthcare Analysis
IRJET- A Prediction Engine for Influenza  Pandemic using Healthcare AnalysisIRJET- A Prediction Engine for Influenza  Pandemic using Healthcare Analysis
IRJET- A Prediction Engine for Influenza Pandemic using Healthcare Analysis
IRJET Journal
 
rpaper
rpaperrpaper
rpaper
imu409
 
AIM NIAC PNNL-SA-116502
AIM NIAC PNNL-SA-116502AIM NIAC PNNL-SA-116502
AIM NIAC PNNL-SA-116502
Mark Greaves
 
How do we detect malware? A step-by-step guide
How do we detect malware? A step-by-step guideHow do we detect malware? A step-by-step guide
How do we detect malware? A step-by-step guide
Marcus Botacin
 
Ad

More from amiable_indian (20)

Phishing As Tragedy of the Commons
Phishing As Tragedy of the CommonsPhishing As Tragedy of the Commons
Phishing As Tragedy of the Commons
amiable_indian
 
Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art
amiable_indian
 
Secrets of Top Pentesters
Secrets of Top PentestersSecrets of Top Pentesters
Secrets of Top Pentesters
amiable_indian
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian
 
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
amiable_indian
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
 
Reverse Engineering for exploit writers
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writers
amiable_indian
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
amiable_indian
 
AntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the uglyAntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the ugly
amiable_indian
 
Reverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure CodingReverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure Coding
amiable_indian
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learned
amiable_indian
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
amiable_indian
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunity
amiable_indian
 
Reverse Engineering for exploit writers
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writers
amiable_indian
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
amiable_indian
 
Web Exploit Finder Presentation
Web Exploit Finder PresentationWeb Exploit Finder Presentation
Web Exploit Finder Presentation
amiable_indian
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualization
amiable_indian
 
Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization
amiable_indian
 
Top Network Vulnerabilities Over Time
Top Network Vulnerabilities Over TimeTop Network Vulnerabilities Over Time
Top Network Vulnerabilities Over Time
amiable_indian
 
What are the Business Security Metrics?
What are the Business Security Metrics? What are the Business Security Metrics?
What are the Business Security Metrics?
amiable_indian
 
Phishing As Tragedy of the Commons
Phishing As Tragedy of the CommonsPhishing As Tragedy of the Commons
Phishing As Tragedy of the Commons
amiable_indian
 
Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art
amiable_indian
 
Secrets of Top Pentesters
Secrets of Top PentestersSecrets of Top Pentesters
Secrets of Top Pentesters
amiable_indian
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian
 
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
amiable_indian
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
 
Reverse Engineering for exploit writers
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writers
amiable_indian
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
amiable_indian
 
AntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the uglyAntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the ugly
amiable_indian
 
Reverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure CodingReverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure Coding
amiable_indian
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learned
amiable_indian
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
amiable_indian
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunity
amiable_indian
 
Reverse Engineering for exploit writers
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writers
amiable_indian
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
amiable_indian
 
Web Exploit Finder Presentation
Web Exploit Finder PresentationWeb Exploit Finder Presentation
Web Exploit Finder Presentation
amiable_indian
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualization
amiable_indian
 
Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization
amiable_indian
 
Top Network Vulnerabilities Over Time
Top Network Vulnerabilities Over TimeTop Network Vulnerabilities Over Time
Top Network Vulnerabilities Over Time
amiable_indian
 
What are the Business Security Metrics?
What are the Business Security Metrics? What are the Business Security Metrics?
What are the Business Security Metrics?
amiable_indian
 
Ad

Recently uploaded (20)

Electro-Optical Infrared (EO-IR) Systems Market Share & Growth Report | 2034
Electro-Optical Infrared (EO-IR) Systems Market Share & Growth Report | 2034Electro-Optical Infrared (EO-IR) Systems Market Share & Growth Report | 2034
Electro-Optical Infrared (EO-IR) Systems Market Share & Growth Report | 2034
janewatson684
 
Unlock Your Potential with Innovative Meta Ads Strategies
Unlock Your Potential with Innovative Meta Ads StrategiesUnlock Your Potential with Innovative Meta Ads Strategies
Unlock Your Potential with Innovative Meta Ads Strategies
gkeyinfosolution
 
Mr. Kalifornia Portfolio Group Project Full Sail University
Mr. Kalifornia Portfolio Group Project Full Sail UniversityMr. Kalifornia Portfolio Group Project Full Sail University
Mr. Kalifornia Portfolio Group Project Full Sail University
bmdecker1
 
Mastering Fact-Oriented Modeling with Natural Language: The Future of Busines...
Mastering Fact-Oriented Modeling with Natural Language: The Future of Busines...Mastering Fact-Oriented Modeling with Natural Language: The Future of Busines...
Mastering Fact-Oriented Modeling with Natural Language: The Future of Busines...
Marco Wobben
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
Continuity and Resilience
 
Simmons Best Luxury Mattress in Singapore Brand.pptx
Simmons  Best Luxury Mattress in Singapore Brand.pptxSimmons  Best Luxury Mattress in Singapore Brand.pptx
Simmons Best Luxury Mattress in Singapore Brand.pptx
Simmons (SEA) Pte Ltd
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
Continuity and Resilience
 
NewBase 08 May 2025 Energy News issue - 1786 by Khaled Al Awadi_compressed.pdf
NewBase 08 May 2025  Energy News issue - 1786 by Khaled Al Awadi_compressed.pdfNewBase 08 May 2025  Energy News issue - 1786 by Khaled Al Awadi_compressed.pdf
NewBase 08 May 2025 Energy News issue - 1786 by Khaled Al Awadi_compressed.pdf
Khaled Al Awadi
 
How AI Helps HR Lead Better, Not Just Work Faster
How AI Helps HR Lead Better, Not Just Work FasterHow AI Helps HR Lead Better, Not Just Work Faster
How AI Helps HR Lead Better, Not Just Work Faster
Aginto - A Digital Agency
 
TechnoFacade Innovating Façade Engineering for the Future of Architecture
TechnoFacade Innovating Façade Engineering for the Future of ArchitectureTechnoFacade Innovating Façade Engineering for the Future of Architecture
TechnoFacade Innovating Façade Engineering for the Future of Architecture
krishnakichu7296
 
Outsourcing Finance and accounting services
Outsourcing Finance and accounting servicesOutsourcing Finance and accounting services
Outsourcing Finance and accounting services
Intellgus
 
IT Support Company Profile by Slidesgo.pptx
IT Support Company Profile by Slidesgo.pptxIT Support Company Profile by Slidesgo.pptx
IT Support Company Profile by Slidesgo.pptx
ahmed gamal
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Zhanar Tuke...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Zhanar Tuke...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Zhanar Tuke...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Zhanar Tuke...
Continuity and Resilience
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
Continuity and Resilience
 
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...
Kunal Bansal Chandigarh
 
How To Think Like Rick Rubin - Shaan Puri.pdf
How To Think Like Rick Rubin - Shaan Puri.pdfHow To Think Like Rick Rubin - Shaan Puri.pdf
How To Think Like Rick Rubin - Shaan Puri.pdf
Razin Mustafiz
 
Bloomberg Asia's Power Players in Healthcare - The Visionaries Transforming a...
Bloomberg Asia's Power Players in Healthcare - The Visionaries Transforming a...Bloomberg Asia's Power Players in Healthcare - The Visionaries Transforming a...
Bloomberg Asia's Power Players in Healthcare - The Visionaries Transforming a...
Ignite Capital
 
The Profitability Paradox: How Dunzo Can Scale AOV While Maintaining Liquidity
The Profitability Paradox: How Dunzo Can Scale AOV While Maintaining LiquidityThe Profitability Paradox: How Dunzo Can Scale AOV While Maintaining Liquidity
The Profitability Paradox: How Dunzo Can Scale AOV While Maintaining Liquidity
xnayankumar
 
Why Startups Should Hire Fractionals - GrowthExpertz
Why Startups Should Hire Fractionals - GrowthExpertzWhy Startups Should Hire Fractionals - GrowthExpertz
Why Startups Should Hire Fractionals - GrowthExpertz
GrowthExpertz
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
Continuity and Resilience
 
Electro-Optical Infrared (EO-IR) Systems Market Share & Growth Report | 2034
Electro-Optical Infrared (EO-IR) Systems Market Share & Growth Report | 2034Electro-Optical Infrared (EO-IR) Systems Market Share & Growth Report | 2034
Electro-Optical Infrared (EO-IR) Systems Market Share & Growth Report | 2034
janewatson684
 
Unlock Your Potential with Innovative Meta Ads Strategies
Unlock Your Potential with Innovative Meta Ads StrategiesUnlock Your Potential with Innovative Meta Ads Strategies
Unlock Your Potential with Innovative Meta Ads Strategies
gkeyinfosolution
 
Mr. Kalifornia Portfolio Group Project Full Sail University
Mr. Kalifornia Portfolio Group Project Full Sail UniversityMr. Kalifornia Portfolio Group Project Full Sail University
Mr. Kalifornia Portfolio Group Project Full Sail University
bmdecker1
 
Mastering Fact-Oriented Modeling with Natural Language: The Future of Busines...
Mastering Fact-Oriented Modeling with Natural Language: The Future of Busines...Mastering Fact-Oriented Modeling with Natural Language: The Future of Busines...
Mastering Fact-Oriented Modeling with Natural Language: The Future of Busines...
Marco Wobben
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
Continuity and Resilience
 
Simmons Best Luxury Mattress in Singapore Brand.pptx
Simmons  Best Luxury Mattress in Singapore Brand.pptxSimmons  Best Luxury Mattress in Singapore Brand.pptx
Simmons Best Luxury Mattress in Singapore Brand.pptx
Simmons (SEA) Pte Ltd
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
Continuity and Resilience
 
NewBase 08 May 2025 Energy News issue - 1786 by Khaled Al Awadi_compressed.pdf
NewBase 08 May 2025  Energy News issue - 1786 by Khaled Al Awadi_compressed.pdfNewBase 08 May 2025  Energy News issue - 1786 by Khaled Al Awadi_compressed.pdf
NewBase 08 May 2025 Energy News issue - 1786 by Khaled Al Awadi_compressed.pdf
Khaled Al Awadi
 
How AI Helps HR Lead Better, Not Just Work Faster
How AI Helps HR Lead Better, Not Just Work FasterHow AI Helps HR Lead Better, Not Just Work Faster
How AI Helps HR Lead Better, Not Just Work Faster
Aginto - A Digital Agency
 
TechnoFacade Innovating Façade Engineering for the Future of Architecture
TechnoFacade Innovating Façade Engineering for the Future of ArchitectureTechnoFacade Innovating Façade Engineering for the Future of Architecture
TechnoFacade Innovating Façade Engineering for the Future of Architecture
krishnakichu7296
 
Outsourcing Finance and accounting services
Outsourcing Finance and accounting servicesOutsourcing Finance and accounting services
Outsourcing Finance and accounting services
Intellgus
 
IT Support Company Profile by Slidesgo.pptx
IT Support Company Profile by Slidesgo.pptxIT Support Company Profile by Slidesgo.pptx
IT Support Company Profile by Slidesgo.pptx
ahmed gamal
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Zhanar Tuke...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Zhanar Tuke...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Zhanar Tuke...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Zhanar Tuke...
Continuity and Resilience
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
Continuity and Resilience
 
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...
Kunal Bansal Chandigarh
 
How To Think Like Rick Rubin - Shaan Puri.pdf
How To Think Like Rick Rubin - Shaan Puri.pdfHow To Think Like Rick Rubin - Shaan Puri.pdf
How To Think Like Rick Rubin - Shaan Puri.pdf
Razin Mustafiz
 
Bloomberg Asia's Power Players in Healthcare - The Visionaries Transforming a...
Bloomberg Asia's Power Players in Healthcare - The Visionaries Transforming a...Bloomberg Asia's Power Players in Healthcare - The Visionaries Transforming a...
Bloomberg Asia's Power Players in Healthcare - The Visionaries Transforming a...
Ignite Capital
 
The Profitability Paradox: How Dunzo Can Scale AOV While Maintaining Liquidity
The Profitability Paradox: How Dunzo Can Scale AOV While Maintaining LiquidityThe Profitability Paradox: How Dunzo Can Scale AOV While Maintaining Liquidity
The Profitability Paradox: How Dunzo Can Scale AOV While Maintaining Liquidity
xnayankumar
 
Why Startups Should Hire Fractionals - GrowthExpertz
Why Startups Should Hire Fractionals - GrowthExpertzWhy Startups Should Hire Fractionals - GrowthExpertz
Why Startups Should Hire Fractionals - GrowthExpertz
GrowthExpertz
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
Continuity and Resilience
 

Quantitive Time Series Analysis of Malware and Vulnerability Trends

  • 1. By Craig S Wright, DTh LLM (Cand.) MNSA MMIT CISA CISM CISSP ISSMP ISSAP G7799 GCFA CCE MSDBA AFAIM MACS And a partridge in a pear tree… A QUANTITATIVE TIME SERIES ANALYSIS OF MALWARE AND VULNERABILITY TRENDS
  • 2. Who Am I Senior IS Audit Manager - BDO My Specialties ISMS, ISO 7799 Consulting and Audit/Review Digital Forensics Information Security Design and Review Threat/Risk Analysis and Review Information Risk and Management (ANZ4360) Data Mining Neural Networks Anomaly Detection Systems CAATS Technology Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) Cryptography Craig S Wright, DTh LLM (Cand.) MNSA MMIT CISA CISM CISSP ISSMP ISSAP G7799 GCFA CCE MSDBA AFAIM MACS And a partridge in a pear tree…
  • 3. Today’s Presentation To effectively protect against attacks to the computers systems and network architecture, we need to understand the threats and to be able to create predictive models for them.
  • 4. A Quantitative Time Series Analysis of Malware and Vulnerability Trends Introduction and objectives The creation of Quantitative Risk models in Information Systems Security is a field in its infancy. The prediction of threats is oft touted as being too difficult due to a shortage of data and the costs associated with collecting an analysing data for a site.
  • 5. Research Design / Methods / Data Collection It has been deduced that three main problems exist within the analytical process involved with Information Systems security (Valentino, 2003): utilising all available information sources, verifying the validity of a suspected computer system intrusion, and following a standard process.
  • 6. Research Data Sources The Wildlist organisation Virus Bulletin Vendor Virus bulletins Vendor vulnerability announcements CERT
  • 7. ARIMA techniques for time-series analysis Three sets of data have been collected for analysis. These consist of: The reported monthly Virus Incidents (Virus.No), The numbers of infections/incidents associated with the most prevent malware in the month (Top.Mth), and The Wildlist collated monthly data for malware reported “in the wild” (Wild.Lst).
  • 8. Initial observations Visual analysis alone is sufficient to see that trends in malicious code incidents have increased significantly over the last 3 years in a non-linear manner.
  • 9. Wildlist Trends It is clear that there is a trend and that the variance increases with the mean.
  • 10. A logarithmic transform was selected for the three datasets There is a clear trend with all three sets of data with the number of malicious code incidents increasing over time. The trends are all roughly linear (particularly the Wildlist data), but it is difficult to be sure in the presence of the other features.
  • 11. Analysis of Wildlist Data A Timeplot of d=1 of the logarithm for the Wildlist data shows that the series is stationary after taking one difference. There appears to be no seasonality with this timeseries.
  • 14. Inspection of the ACF PACF Plots The ACF/PACF plots suggested that either an AR (1) or MA (1) model for the differenced series may be suitable. Taking the log transformed differenced values (d=1), the ACF plot decreases exponentially to zero and the PACF plot is significant at lag 1.
  • 15. Model Comparison -685.5491 0.985 -675.5562 -681.5908 0.010813 149 IMA(1, 2) No Intercept -685.5822 0.985 -675.5899 -681.6245 0.0108106 149 ARI(2, 1) No Intercept -685.5343 0.985 -680.5581 -683.5753 0.010742 150 IMA(1, 1) No Intercept -685.3136 0.985 -680.3351 -683.3524 0.0107579 150 ARI(1, 1) No Intercept -2LogLH RSquare SBC AIC Variance DF Model
  • 16. Model Selection Over-fitting either model gave back values of the coefficients that where not significant at the p-value < 5%. The diagnostic plots for each model produced no significant values within the residual plots and we could see no evidence of inadequacy for either model.
  • 17. Comparison of forecasts To see if there was any important difference in the models in terms of the aim of the analysis (forecasting), forecasts and forecast intervals were computed to a time of the last 5 months to May 2006.
  • 18. Comparison of forecasts ARI models where tested. No significant differences where found between the two models and all forecast data were contained in the predicted confidence intervals.
  • 19. Analysis of Virus Incidents The analysis is focused on the overall pattern of malware incidents reported monthly. A side comparison of the number of incidents which are attributable to the most prevalent malware varietals has also been undertaken.
  • 20.  
  • 21. Analysis of Virus Incidents It is clear from the plot of the two variables alone that the most prevalent malware varietals follows a similar pattern to the total number of incidents and that the two functions are becoming more closely correlated over time. This would indicate that individual computer viruses and worms are having a greater impact individually.
  • 22. Analysis of Virus Incidents The trend is thus that fewer numbers of malicious code types are causing more damage. In the past a large number of virus types where generally acting at any given time. The trend is towards greater effects by specific malicious code samples.
  • 23. ACF
  • 24. PACF
  • 25. Model Comparison -79.10179 0.908 -55.38593 -69.83768 0.5700881 128 ARI(5, 1) No Intercept -74.54214 0.904 -55.46153 -67.02293 0.5865218 129 ARI(4, 1) No Intercept -2LogLH RSquare SBC AIC Variance DF Model
  • 26. ARI (5, 1) Model Model: ARI (5, 1) Parameter Estimates 0.0326 -2.16 0.0973837 -0.2103974 5 AR5 0.0003 -3.74 0.0965763 -0.3610897 4 AR4 0.0025 -3.09 0.0883067 -0.272786 3 AR3 0.0235 -2.29 0.0887335 -0.2034253 2 AR2 <.0001 -4.57 0.0850698 -0.3886438 1 AR1 Prob>|t| t Ratio Std Error Estimate Lag Term
  • 27. The residual plot of the ARI (5, 1) model for the fitted value v the actual value shows no recognisable pattern
  • 28. Tests of the model The residual plot of the ARI (5, 1) model for the fitted value v the actual value shows no recognisable pattern. A Normal Q-Q plot of the residuals shows that the residuals are near to normal, though they are slightly skewed. None of the values seem to be extreme outliers however and have not been excluded.
  • 30. The ARI (5, 1) model supports predictions for the 5 month period with all the observed values falling into the confidence limits Forecast Values
  • 31. Findings The threat is not abating! It also seems that the industry is not keeping up with the threat. Further research into why this is occurring to assess the future levels of threats should be conducted
  • 32. Where this can lead The results demonstrate that time series analysis is a valid method of predicting trends in malicious code incidents. The results have applications to operational risk in general and further development of models and risk engines is warranted from the findings.
  • 33. Further Research Further research into frequency domain analysis is expected to aide in the determination of patterns in past threat frequencies. Analysis of vulnerability data using stochastic point-process models to gain more insight into the mechanistic nature of the time series and how it is affected through the changing nature and evolution of the Malware varietals would also be expected to produce significant findings.
  • 34. To Conclude It is feasible to use ARIMA models to forecast short-term malware trends. The numbers of incidents are modelled and the incident data are input into the software package for future analysis. Monthly trend patterns may be derived from statistic procedure.
  • 35. Thank You Thank you for your time
  • 36. Bibliography Or a day in the life of an academic junkie… Berman (1992) “Sojourns and Extremes of Stochastic Processes”, Wadsworth. Box, P., Jenkins, G. (1976) “Time-Series Analysis”, Rev. Ed. Holden-Day, US Bridwell, L.M. & Tibbet, P. (2000) “Sixth annual ICSA Labs Computer Virus Prevalance Survey 2000”, ICSA Labs US Brillinger, David (1975) “Time Series: Data Analysis and Theory (context)” Priestley Brockwell, P.J. & Davis, R.A. (1991). “ITSM: An Interactive Time Series Modelling Package for the PC”, Springer-Verlag. New York Brockwell, P.J. & Davis, R.A. (1991) “Time series: Theory and Methods”, Springer-Verlag. Brockwell, P.J., & Davis, R.A. (1996) “Introduction to Time Series and Forecasting”, 1996, Springer Brown , Lawrence D. (2003) “Estimation and Prediction in a Random Effects Point-process Model Involving Autoregressive Terms” Statistics Department, U. of Penn. Butler, S.A. (2001), “Improving Security Technology Selections with Decision Theory”. Emerald Cox, D. R, & Isham, V., (1985) “Point Processes”, Chapman & Hall. Cox, D. & Miller, H. (1965) “The Theory of Stochastic Processes”. Chapman and Hall, London, 1965. Chatfield, C. (1996) “The Analysis of Time Series : An Introduction”. 5th Ed, Chapman and Hall Chen, Z., Gao, L. & Kwiat. K, (2003) “Modeling the spread of active worms”. In IEEE INFOCOM Coulthard, A. Vuori, T. A. (2002) “Computer Viruses: a quantitative analysis” Logistics Information Management, Volume 15, Number 5/96, 2002 pp 400-409 Figueiredo Daniel R., Liu, Benyuan, Misra, Vishal, & Towsley, Don (200) “On the autocorrelation structure of TCP traffic”, Department of Computer Science, University of Massachusetts, Amherst, MA 01003-9264, USA, 2002 Elsevier Science B.V. Forgionne, G.A. (1999), “Management Science”, Wiley Custom Services, USA. Giles. K.E. (2004) “On the spectral analysis of backscatter data”. In GMP - Hawai 2004, URL:http://www.mts.jhu.edu/ priebe/FILES/-gmp hawaii04.pdf. Garetto, M., Gong, W., Towsley, D., (2003) “Modeling Malware Spreading Dynamics,” in Proc. of INFOCOM 2003, San Francisco, April, 2003. Harder, Uli, Johnson, Matt W., Bradley, Jeremy T. & Knottenbelt William J. (200x) “Observing Internet Worm and Virus Attacks with a Small Network Telescope”, Department of Computing, Imperial College London, South Kensington Campus, London SW7 2AZ, United Kingdom Electronic Notes in Theoretical Computer Science Hipel, K. W., & A.I. McLeod, A. I., (1994) “Time Series Modelling of Water Resources and Environmental Systems”, Elsevier, Amsterdam Kephart, J. O. & White, S. R. (1993) “Measuring and Modeling Computer Virus Prevalence”, Proc. of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 2-15, May. 1993 Leadbetter, M.R., Lindgren, G. and Rootzen, H. (1983) “Extremes and Related Properties of Random Sequences and Processes”. Springer. Berlin. Pouget, F., Dacier, M., & Pham V.H. (200) “Understanding Threats: a Prerequisite to Enhance Survivability of Computing Systems” Institut Eur_ecom B.P. 193, 06904 Sophia Antipolis, FRANCE Rohloff, K., & Basar, T., (2005) “Stochastic Behaviour of Random Constant Scanning Worms,” in Proc. of IEEE Conference on Computer Communications and Networks 2005 (ICCCN 2005), San Diego, CA, Oct., 2005. Spafford, Eugene (1989) “The Internet Worm: Crisis and Aftermath” Communications of the ACM 32, 6 pp.678-687 June 1989 Shumway, R. H & Stoffer, D.S, (2000), “Time Series Analysis and its Applications, Springer-Verlag New York Tong (1990) “Non-linear Time Series: A Dynamical Systems Approach”, Oxford Univ. Press. Valentino, Christopher C. (2003) “Smarter computer intrusion detection utilizing decision modelling” Department of Information Systems, The University of Maryland, Baltimore County, Baltimore, MD, USA Yegneswaran, V., Barford, P., & Ullrich J. (2003) “Internet Intrusions: Global Characteristics and Prevalence”, SIGMETRICS 2003. Zou, C. C., Gong, W., & Towsley, D. (2003) “Worm propagation modelling and analysis under dynamic quarantine defense”. In ACM WORM 03, October 2003. Zou, C. C., Gong, W., Towsley, D., & Gao, L., (2005) “The Monitoring and Early Detection of Internet Worms,” IEEE/ACM Transactions on Networking, 13(5), 961- 974, October 2005. Zou, C. C., Gong, W., & Towsley, D. (2003) “Monitoring and Early Warning for Internet Worms”, Umass ECE Technical Report TR-CSE-03-01, 2003. Zou, C. C., Gong, W., & Towsley, D. “On the Performance of Internet Worm Scanning Strategies,” to appear in Journal of Performance Evaluation.

Editor's Notes

  • #2: A QUANTITATIVE TIME SERIES ANALYSIS OF MALWARE AND VULNERABILITY TRENDS
  翻译: