MARCH 30, 2022 — Malicious software activities, commonly known as “malware,” represent a big threat against modern society.
A UTSA-led research team is investigating ways to accurately predict these attacks. Mechanical Engineering Professor Yusheng Feng and doctoral student Van Trieu-Do in the Margie and Bill Klesse College of Engineering and Integrated Design, in collaboration with professor Shouhuai Xu from the Department of Computer Science at the University of Colorado at Colorado Springs, are studying how to use mathematical tools and computer simulation to foresee cyberattacks.
According to a 2019 report by ForgeRock, 2.8 billion consumer data records were breached in 2018, costing more than $654 billion to U.S. organizations, posing a massive industry threat.
The current pervasive security threats motivated the UTSA researchers to develop and use cyber defense tools and sensors to monitor the threats and collect data, which can be used for various purposes in developing defense mechanisms.
“The current damages call for studies to understand and characterize cyberattacks from different perspectives and at various levels of intrusion. There are multiple variables that go into predicting the potential damage these attacks may cause as the aggressors get more sophisticated,” said Feng.
Using predictive situational awareness analysis, the team studied the distinctive nature of the attacks to accurately predict the threats that target and potentially harm personal devices, servers and networks.
“Most studies on cyberattacks focus on microscopic levels of abstractions, meaning how to defend against a particular attack,” Feng said. “Cyber attackers can successfully break in by exploiting a single weakness in a computer system.”
The study aims to analyze the macroscopic levels of abstractions.
“Such macroscopic-level studies are important because they would offer insights towards holistic solutions to defending cyberattacks,” he added.
Feng explains, “It’s very hard to single out the cause of each attack, however, we have big data with time series for each IP address (location). In this research, we use ‘causality’ when there are inter-relationships among IP addresses that have similar patterns of temporal features for identifying the threat.”
The researchers utilized Granger causality (G-causality) to study the vulnerabilities from a regional perspective of multiple threats, analyzing the cause and effect to identify cyber vulnerabilities or how the infiltrators attack an entity, in this case IP addresses.
G-causality is a statistical concept of causation that is based on prediction, in order to characterize causality, a well-defined mathematical notion has to be established. The research team used Granger causality to determine the nature of the cyberattack signals so the signals can be compared and analyzed in a holistic way.
The team also plans to expand the current body of research and study further on what other kinds of causality will impact users and how to develop the appropriate defense tools to protect against sophisticated attacks.
UTSA Today is produced by University Communications and Marketing, the official news source of The University of Texas at San Antonio. Send your feedback to news@utsa.edu. Keep up-to-date on UTSA news by visiting UTSA Today. Connect with UTSA online at Facebook, Twitter, Youtube and Instagram.
Have questions about making your OER accessible on UTSA Pressbooks? The OER Team and the Digital Accessibility are ready to answer them! Bring your questions about OER and accessibility and receive guidance from our two teams.
Virtual Event (Zoom)Undergraduate students will be presenting their research projects orally. Each student has 10 minutes to present. There will be 2 rounds, first round and final round, where students with the highest scores from the morning session advance to the afternoon session.
Denman & Harris Rooms, H-E-B Student Union, Main CampusIn this workshop, attendees will be introduced to Pandas, a Python tool for working with data easily. It makes it simple to organize and analyze information when data is organized and categorized, like spreadsheets or tables.
Group Spot B, John Peace LibraryUndergraduate students will compete in a timed 3-minute undergraduate research competition.
Biotechnology Sciences and Engineering Building (BSE 2.102,) Main CampusUndergraduate students will share their creative side in an open-mic style format and the 2-minute videos will be screened.
McKinney Humanities (MH 3.01.18,) Main CampusAwards for the events during undergraduate research week, including poster, oral and others, will be announced at a virtual awards ceremony.
Virtual EventDía en la Sombrilla, formerly Fiesta UTSA, is a festival hosted each spring as a part of Fiesta® San Antonio events. Sponsored by Roadrunner Productions, the event features music, food, confetti, games, event t-shirts, and more.
Sombrilla Plaza, Main CampusThe University of Texas at San Antonio is dedicated to the advancement of knowledge through research and discovery, teaching and learning, community engagement and public service. As an institution of access and excellence, UTSA embraces multicultural traditions and serves as a center for intellectual and creative resources as well as a catalyst for socioeconomic development and the commercialization of intellectual property - for Texas, the nation and the world.
To be a premier public research university, providing access to educational excellence and preparing citizen leaders for the global environment.
We encourage an environment of dialogue and discovery, where integrity, excellence, respect, collaboration and innovation are fostered.