Heuristic multistep attack scenarios construction based on kill chain

被引:0
|
作者
Cheng Jie [1 ]
Zhang Ru [2 ]
Wei Jiahui [1 ]
Lu Chen [2 ]
Lü Zhishuai [2 ]
Lin Bingjie [1 ]
Xia Ang [1 ]
机构
[1] State Grid Information and Telecommunication Branch
[2] School of Cyberspace Security, Beijing University of Posts and Telecommunications
关键词
D O I
10.19682/j.cnki.1005-8885.2023.0003
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Network attacks evolved from single-step and simple attacks to complex multistep attacks. Current methods of multistep attack detection usually match multistep attacks from intrusion detection systems(IDS) alarms based on the correlation between attack steps. However, IDS has false negatives and false positives, which leads to incomplete or incorrect multistep attacks. Association based on simple similarity is difficult to obtain an accurate attack cluster, while association based on prior knowledge such as attack graphs is difficult to guarantee a complete attack knowledge base. To solve the above problems, a heuristic multistep attack scenarios construction method based on the kill chain(HMASCKC) model was proposed. The attack model graph can be obtained from dual data sources and heuristic multistep attack scenarios can be obtained through graph matching. The model graph of the attack and the predicted value of the next attack are obtained by calculating the matching value. And according to the purpose of the multistep attack, the kill chain model is used to define the initial multistep attack model, which is used as the initial graph for graph matching. Experimental results show that HMASCKC model can better fit the multistep attack behavior, the effect has some advantages over the longest common subsequence(LCS) algorithm, which can close to or match the prediction error of judge evaluation of attack intension(JEAN) system. The method can make multistep attack model matching for unknown attacks, so it has some advantages in practical application.
引用
收藏
页码:61 / 71
页数:11
相关论文
共 50 条
  • [31] A heuristic framework for video-based teaching and learning scenarios in higher education
    Stark, Katharina Sophie
    Wekerle, Christina
    Bischoff, Alena
    Schweiger, Moritz
    Peuschel, Kristina
    Proske, Kerstin
    Weckerle, Birgit
    Vettermann, Lisa
    Schindler, Ann-Kathrin
    [J]. JOURNAL OF RESEARCH ON TECHNOLOGY IN EDUCATION, 2023,
  • [32] A Combat Capability Evaluation Method of UAV Swarm Based on Kill Chain
    Sun, Li-Na
    Liu, Jun-yuan
    Zhao, Ze-mao
    Chen, Zhi-wei
    [J]. PROCEEDINGS OF 2022 INTERNATIONAL CONFERENCE ON AUTONOMOUS UNMANNED SYSTEMS, ICAUS 2022, 2023, 1010 : 1378 - 1385
  • [33] Attack Chains Construction Method Based on Vulnerabilities Combination
    Zhao, Jing
    Sun, Hao
    Cheng, Yang
    [J]. International Journal of Network Security, 2022, 24 (03): : 389 - 400
  • [34] Attack scenario construction based on rule and fuzzy clustering
    Ma, LR
    Yang, L
    Wang, JX
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 328 - 333
  • [35] LSHA: A Local Structure-Based Community Detection Attack Heuristic Approach
    Yang, Haipeng
    Chen, Lin
    Cheng, Fan
    Qiu, Jianfeng
    Zhang, Lei
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (02) : 2966 - 2978
  • [36] Enhanced heuristic for finance-based scheduling of construction projects
    Gajpal, Yuvraj
    Elazouni, Ashraf
    [J]. CONSTRUCTION MANAGEMENT AND ECONOMICS, 2015, 33 (07) : 531 - 553
  • [37] Bigram and Unigram Based Text Attack via Adaptive Monotonic Heuristic Search
    Yang, Xinghao
    Liu, Weifeng
    Bailey, James
    Tao, Dacheng
    Liu, Wei
    [J]. THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 706 - 714
  • [38] Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
    Wang, Wenjuan
    Du, Xuehui
    Shan, Dibin
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (01): : 1 - 17
  • [39] Research on network attack analysis method based on attack graph of absorbing Markov chain
    Kang, Haiyan
    Long, Molan
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (02): : 122 - 135
  • [40] Frequent subcircuits extraction algorithm based on heuristic chain search
    Pan, Wei-Tao
    Xie, Yuan-Bin
    Hao, Yue
    Shi, Jiang-Yi
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2011, 41 (06): : 1748 - 1753