Preliminary Investigation into Uncertainty-Aware Attack Stage Classification
By: Alessandro Gaudenzi , Lorenzo Nodari , Lance Kaplan and more
Potential Business Impact:
Helps computers guess hacker's next move.
Advanced Persistent Threats (APTs) represent a significant challenge in cybersecurity due to their prolonged, multi-stage nature and the sophistication of their operators. Traditional detection systems typically focus on identifying malicious activity in binary terms (benign or malicious) without accounting for the progression of an attack. However, effective response strategies depend on accurate inference of the attack's current stage, as countermeasures must be tailored to whether an adversary is in the early reconnaissance phase or actively conducting exploitation or exfiltration. This work addresses the problem of attack stage inference under uncertainty, with a focus on robustness to out-of-distribution (OOD) inputs. We propose a classification approach based on Evidential Deep Learning (EDL), which models predictive uncertainty by outputting parameters of a Dirichlet distribution over possible stages. This allows the system not only to predict the most likely stage of an attack but also to indicate when it is uncertain or the input lies outside the training distribution. Preliminary experiments in a simulated environment demonstrate that the proposed model can accurately infer the stage of an attack with calibrated confidence while effectively detecting OOD inputs, which may indicate changes in the attackers' tactics. These results support the feasibility of deploying uncertainty-aware models for staged threat detection in dynamic and adversarial environments.
Similar Papers
Adversarial Augmentation and Active Sampling for Robust Cyber Anomaly Detection
Cryptography and Security
Finds hidden computer attacks with less data.
Ranking-Enhanced Anomaly Detection Using Active Learning-Assisted Attention Adversarial Dual AutoEncoders
Machine Learning (CS)
Finds hidden computer attacks with less work.
An Automated Attack Investigation Approach Leveraging Threat-Knowledge-Augmented Large Language Models
Cryptography and Security
Finds hidden computer attacks and explains them clearly.