DocumentCode :
1664715
Title :
Probabilistic threat propagation for malicious activity detection
Author :
Carter, Kevin M. ; Idika, Nwokedi ; Streilein, William W.
Author_Institution :
MIT Lincoln Lab., Lexington, MA, USA
fYear :
2013
Firstpage :
2940
Lastpage :
2944
Abstract :
In this paper, we present a method for detecting malicious activity within networks of interest. We leverage prior community detection work by propagating threat probabilities across graph nodes, given an initial set of known malicious nodes. We enhance prior work by employing constraints which remove the adverse effect of cyclic propagation that is a byproduct of current methods. We demonstrate the effectiveness of Probabilistic Threat Propagation on the task of detecting malicious web destinations.
Keywords :
Internet; graph theory; probability; security of data; community detection; cyclic propagation; graph nodes; malicious Web destination detection; malicious activity detection; malicious nodes; probabilistic threat propagation; Algorithm design and analysis; Communities; IP networks; Inference algorithms; Iterative methods; Probabilistic logic; Security; Graph algorithms; blacklist; community detection; network security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on
Conference_Location :
Vancouver, BC
ISSN :
1520-6149
Type :
conf
DOI :
10.1109/ICASSP.2013.6638196
Filename :
6638196
Link To Document :
بازگشت