Title :
Probabilistic threat propagation for malicious activity detection
Author :
Carter, Kevin M. ; Idika, Nwokedi ; Streilein, William W.
Author_Institution :
MIT Lincoln Lab., Lexington, MA, USA
Abstract :
In this paper, we present a method for detecting malicious activity within networks of interest. We leverage prior community detection work by propagating threat probabilities across graph nodes, given an initial set of known malicious nodes. We enhance prior work by employing constraints which remove the adverse effect of cyclic propagation that is a byproduct of current methods. We demonstrate the effectiveness of Probabilistic Threat Propagation on the task of detecting malicious web destinations.
Keywords :
Internet; graph theory; probability; security of data; community detection; cyclic propagation; graph nodes; malicious Web destination detection; malicious activity detection; malicious nodes; probabilistic threat propagation; Algorithm design and analysis; Communities; IP networks; Inference algorithms; Iterative methods; Probabilistic logic; Security; Graph algorithms; blacklist; community detection; network security;
Conference_Titel :
Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on
Conference_Location :
Vancouver, BC
DOI :
10.1109/ICASSP.2013.6638196