| 
			 A new study from the U.S. Army Research Laboratory presents 
			evidence that the number of cyber intrusions can be predicted, 
			particularly when analysts are already observing activities on a 
			company or government organization's computer network.
  
			Researchers say new models that predict the number of intrusions 
			would be of significant value to providers of cyber security and 
			resilience services. 
			
			 
		
			| 
			 
			  
			Army model predicts number of Cyber Attacks that pierce company 
			networks. (U.S. Army image by Jhi Scott, Army Research Laboratory, 
			September 2017) 
			 | 
		 
			 
					Dr. Nandi O. Leslie was part of the team that studied 
					empirical data on actual successful cyber intrusions 
					committed against a number of different organizations. These 
					data were obtained from a provider of cyber defense 
					services, which defended those organizations as clients.  
					 The researchers were able to determine the correlation 
					-- or lack thereof -- between the number of successful 
					intrusions and observed features of an organization, for 41 
					organizations. The team looked at the security incident 
					reports containing detailed information about malicious 
					activities and computer security policy violations by users 
					and operators; DNS traffic, collected with specialized and 
					open source software for all organizations in this study; 
					and other data sources describing a selected subset of 
					features of each organization's network topology and cyber 
					footprint. As a result, the researchers were able to propose 
					four generalized linear models (GLMs) to predict the number 
					of successful cyber intrusions into an organization's 
					computer network, where the rate at which intrusions occur 
					is a function of several observable characteristics of the 
					organization.
  Additionally, they analyzed regression 
					results for adequacy of fit to the intrusions data. Among 
					their key findings is that one of these models -- the 
					generalization of the Poisson regression model to the 
					negative binomial GLM model -- predicts the response 
					variable appreciably better than others. They also 
					demonstrate that the intrusions data exhibit sufficient 
					regularity (in statistical sense), and the construction of a 
					practically useful predictive model is feasible, said Leslie 
					of ARL's Network Security Branch.
  The key research 
					question -- which of the initially conjectured predictor 
					variables should be included in the model -- brought rather 
					surprising findings, Leslie said.
  "Several of the 
					predictor variables that were recommended to the researchers 
					by subject matter experts turned out to be lacking in 
					influence or even misleading. For example, SMEs felt that 
					the extent to which an organization is visible on the 
					Internet, as measured for example by the number of records 
					found related to that organization on the popular Google 
					Scholar, would be a significant predictor of intrusion 
					frequency. However, it turned out that such visibility alone 
					is not a useful predictor of successful intrusions," Leslie 
					said.
  Yet another variable that the SMEs expected to 
					be influential--the number of hosts within an organization's 
					network--also turns out to be a less significant predictor 
					for the NB GLMs than hypothesized by SMEs.
  On the 
					other hand, the researchers show that the number of 
					violations of an organization's internal cyber security 
					policies is a strong predictor of the number of intrusions. 
					 "This finding is rather intuitive. Indeed, if users such 
					as employees of the organization lack the discipline or 
					knowledge to comply with organizational cyber hygiene 
					policies, and if the organization is unable or unwilling to 
					enforce its own policies, it is easy to expect that the 
					organization's cyber defenses are poor, leading to more 
					frequent intrusions. Less intuitive is the finding that the 
					frequency of accesses by the organization's networks to the 
					domains domestic.net and foreign.net are strong predictors 
					of intrusions. Although it is not entirely clear why this 
					should be the case, the researchers offer a possible 
					explanation," Leslie said.
  Among client 
					organizations, the numbers of intrusions differ dramatically 
					by many orders of magnitude. Some organizations experience a 
					large number of intrusions in a given time frame, whereas 
					others may not experience any intrusions for a number of 
					years. A specialized organization, such as a managed 
					security service provider, is often used by an organization 
					to provide cyber defense services. For a MSSP, the costs of 
					doing business are heavily influenced by the number of 
					intrusions experienced by its clients. Therefore, when a 
					MSSP negotiates its fees with a new prospective client, it 
					needs a model to estimate how many intrusions should be 
					expected over some fixed time period.
  Another example 
					where such a model would be of high value is its use for 
					actuarial purposes. In a broader sense, a model of this 
					nature contributes to our fundamental understanding of cyber 
					situational awareness and ways to monitor, quantify, and 
					manage cyber risk. Finally, a model of this nature may offer 
					clues toward enhancing the security posture and perhaps the 
					design and operation of an organization's computing systems 
					and networks. If the model indicates that certain 
					characteristics are associated with an increased number of 
					intrusions, the organization might be able to find ways to 
					modify those characteristics.
  This research is 
					presented in a paper "Statistical models for the number of 
					successful cyber intrusions", by Nandi O. Leslie, Richard E. 
					Harang, Lawrence P. Knachel and Alexander Kott; the paper is 
					to appear in a special issue of the Journal of Defense 
					Modeling and Simulation in 2018.  
			-------------------------------- 
			The U.S. Army Research Laboratory, currently celebrating 25 years 
			of excellence in Army science and technology, is part of the U.S. 
			Army Research, Development and Engineering Command, which has the 
			mission to provide innovative research, development and engineering 
			to produce capabilities that provide decisive overmatch to the Army 
			against the complexities of the current and future operating 
			environments in support of the joint warfighter and the nation. 
			RDECOM is a major subordinate command of the U.S. Army Materiel 
			Command. 
			By U.S. Army T'Jae Ellis, Army Research Laboratory 
					Provided 
					through DVIDS 
			Copyright 2017 
					
					Comment on this article  |