Heuristic multistep attack scenarios construction based on kill chain

被引:0
|
作者
Cheng Jie [1 ]
Zhang Ru [2 ]
Wei Jiahui [1 ]
Lu Chen [2 ]
Lü Zhishuai [2 ]
Lin Bingjie [1 ]
Xia Ang [1 ]
机构
[1] State Grid Information and Telecommunication Branch
[2] School of Cyberspace Security, Beijing University of Posts and Telecommunications
关键词
D O I
10.19682/j.cnki.1005-8885.2023.0003
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Network attacks evolved from single-step and simple attacks to complex multistep attacks. Current methods of multistep attack detection usually match multistep attacks from intrusion detection systems(IDS) alarms based on the correlation between attack steps. However, IDS has false negatives and false positives, which leads to incomplete or incorrect multistep attacks. Association based on simple similarity is difficult to obtain an accurate attack cluster, while association based on prior knowledge such as attack graphs is difficult to guarantee a complete attack knowledge base. To solve the above problems, a heuristic multistep attack scenarios construction method based on the kill chain(HMASCKC) model was proposed. The attack model graph can be obtained from dual data sources and heuristic multistep attack scenarios can be obtained through graph matching. The model graph of the attack and the predicted value of the next attack are obtained by calculating the matching value. And according to the purpose of the multistep attack, the kill chain model is used to define the initial multistep attack model, which is used as the initial graph for graph matching. Experimental results show that HMASCKC model can better fit the multistep attack behavior, the effect has some advantages over the longest common subsequence(LCS) algorithm, which can close to or match the prediction error of judge evaluation of attack intension(JEAN) system. The method can make multistep attack model matching for unknown attacks, so it has some advantages in practical application.
引用
收藏
页码:61 / 71
页数:11
相关论文
共 50 条
  • [1] Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering
    Zhang, Ru
    Huo, Yanyu
    Liu, Jianyi
    Weng, Fangyu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [2] Kill Chain Attack Modelling for Hidden Channel Attack Scenarios in Industrial Control Systems
    Neubert, Tom
    Vielhauer, Claus
    [J]. IFAC PAPERSONLINE, 2020, 53 (02): : 11074 - 11080
  • [3] A heuristic multi-step attack model generation method based on kill chain model
    Liu, Jianyi
    Lu, Chen
    Lin, Bingjie
    Guo, Han
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2021, 128 : 36 - 37
  • [4] Identification of Attack Paths Using Kill Chain and Attack Graphs
    Sadlek, Lukas
    Celeda, Pavel
    Tovarnak, Daniel
    [J]. PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [5] Network Attack Chain Security Model Construction Based On Attack Framework
    Hu, Jian
    Wang, Hailin
    Li, Hanruo
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (04) : 116 - 127
  • [6] AClog: Attack Chain Construction Based on Log Correlation
    Li, Teng
    Ma, Jianfeng
    Pei, Qingqi
    Shen, Yulong
    Lin, Chi
    Ma, Siqi
    Obaidat, Mohammad S.
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [7] Military Chain: Construction of Domain Knowledge Graph of Kill Chain Based on Natural Language Model
    Wang, Yanfeng
    Wang, Tao
    Wang, Junhui
    Zhou, Xin
    Gao, Ming
    Liu, Runmin
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [8] Extracting network based attack narratives through use of the cyber kill chain: A replication study
    Weathersby, Aaron
    Washington, Mark
    [J]. IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 29 - 42
  • [9] Heuristic-Based Service Chain Construction with Security-Level Management
    Amaya, Daisuke
    Tachibana, Takuji
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2023, E106B (12) : 1380 - 1391
  • [10] Heuristic Service Chain Construction Algorithm Based on VNF Performances for Optimal Data Transmission Services
    Sumi, Yasuhito
    Tachibana, Takuji
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2021, E104B (07) : 817 - 828