New statistical model examines massive amounts of data to automatically spot anomalies

July 31, 2017

With the number of security breaches and cyber-attacks on the rise and reports of the financial burden of these varying from $400 billion a year to $2.1 trillion by 2019, cyber-security experts may soon have a new tool in the fight against online threats. Patrick Rubin-Delanchy, Heilbronn Research Fellow in Statistics at the University of Oxford, will present a new statistical method for monitoring networks to automatically detect "strange behavior" and ultimately prevent intrusion on Monday, July 31, at the 2017 Joint Statistical Meetings (JSM).

Data arising in cyber-security applications often have a structure. A tool that monitors networks has access to massive amounts of data of which "normal" behavior can be observed. "Since data on intrusions is lacking," notes Rubin-Delanchy "accurate statistical modeling of connectivity behavior has important implications, particularly for network intrusion detection."

Rubin-Delanchy—in collaboration with Nick Heard, reader in statistics at Imperial College London, and Carey Priebe, professor of statistics at The Johns Hopkins University—has developed a "linear algebraic" approach to network anomaly detection, in which nodes are embedded in a finite dimensional latent space, where common statistical, signal-processing and machine-learning methodologies are then available. They illustrate results from their methodology on network flow data collected at Los Alamos National Laboratory.

In contrast with traditional cyber-security approaches like anti-virus software, the new methodology is not based on hand-engineered signatures, but rather machine learning in which programs can access and use the data and learn for themselves. "Our anticipation is that this model will provide a more robust approach to cyber-security in the future."

Additional presentations about cybersecurity at JSM will be led by other renowned experts, including the following:

  • Mark Briers, Alan Turing Institute
  • Marina Evangelou, Imperial College London
  • John Abowd, U.S. Census Bureau
  • Melissa Turcotte, Los Alamos National Laboratory
  • Christopher White, Microsoft

Explore further: Newly published cyber security report identifies key research priorities

Related Stories

Researchers study users to increase cyber security

September 28, 2015

Missouri University of Science and Technology researchers are working to build a framework to study the online behavior of Internet users and how that behavior affects the safety of systems and networks.

UK in $2.3 bn plan to 'strike back' at hackers

November 1, 2016

Finance minister Philip Hammond on Tuesday warned Britain will "strike back" against states hacking into strategic networks in order to avoid a military showdown, as part of a new cyber-defence plan.

Recommended for you

New paper answers causation conundrum

November 17, 2017

In a new paper published in a special issue of the Philosophical Transactions of the Royal Society A, SFI Professor Jessica Flack offers a practical answer to one of the most significant, and most confused questions in evolutionary ...

Chance discovery of forgotten 1960s 'preprint' experiment

November 16, 2017

For years, scientists have complained that it can take months or even years for a scientific discovery to be published, because of the slowness of peer review. To cut through this problem, researchers in physics and mathematics ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.