Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts

被引:0
|
作者
Moskal, Stephen [1 ]
Yang, Shanchieh Jay [1 ]
Kuhl, Michael E. [2 ]
机构
[1] Rochester Inst Technol, Dept Comp Engn, Rochester, NY 14623 USA
[2] Rochester Inst Technol, Dept Ind & Syst Engn, Rochester, NY 14623 USA
关键词
MODEL;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Intrusion detection system (IDS) is an integral part of computer networks to monitor and detect threats. However, the alerts raised by these systems are often overwhelming to security analysts, making it difficult to uncover the steps an attacker took to compromise one or more systems in the network. This work presents a novel approach that aggregates IDS alerts and forms sequences of attack activities and their corresponding probabilistic models. This allows comparison of attack sequences to offer insights for unique as well as similar attack behaviors. We aggregate alerts by performing a Gaussian filter on specific alert attributes and model attackers using a suffix-based probabilistic model. We compare sequences generated from ten independent attacking teams with similar objectives demonstrating how our process uncovers similarities and uniqueness between the attacks that was not obvious. The sequences revealed by our process creates meaningful sequences that offers insights on how the attacking teams exploit a network.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 6 条
  • [1] A Bayesian network-based approach for learning attack strategies from intrusion alerts
    Kavousi, Fatemeh
    Akbari, Behzad
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 833 - 853
  • [2] Automatic attack plan recognition from intrusion alerts
    Li, Wang
    Zhi-Tang, Li
    Jie, Ma
    Yang-Ming, Ma
    Ai-Fang, Zhang
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 1170 - +
  • [3] Extracting Novel Attack Strategies for Industrial Cyber-Physical Systems Based on Cyber Range
    Wei, Songxuan
    Jia, Yan
    Gu, Zhaoquan
    Shafiq, Muhammad
    Wang, Le
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 5292 - 5302
  • [4] Discovering novel attack strategies from INFOSEC alerts
    Qin, XZ
    Lee, W
    [J]. COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 439 - 456
  • [5] Extracting Attack Sessions from Real Traffic with Intrusion Prevention Systems
    Chen, I-Wei
    Lin, Po-Ching
    Luo, Chi-Chung
    Cheng, Tsung-Huan
    Lin, Ying-Dar
    Lai, Yuan-Cheng
    Lin, Frank C.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 889 - +
  • [6] Unveiling Multi-Agent Strategies: A Data-Driven Approach for Extracting and Evaluating Team Tactics from Football Event and Freeze-Frame Data
    Yeung, Calvin
    Bunker, Rory
    Fujii, Keisuke
    [J]. JOURNAL OF ROBOTICS AND MECHATRONICS, 2024, 36 (03) : 603 - 617