Attack scenario construction based on rule and fuzzy clustering

被引:0
|
作者
Ma, LR [1 ]
Yang, L
Wang, JX
机构
[1] Natl Def Univ, Sch Elect Sci & Engn, Changsha 410073, Hunan, Peoples R China
[2] Inst China Elect Syst Engn, Beijing 100039, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Correlation of intrusion alerts is a major technique in attack detection to build attack scenario. Rule-based and data mining methods have been used in some previous proposals to perform correlation. In this paper we integrate two complementary methods and introduce fuzzy clustering in the data mining method. To determine the fuzzy similarity coefficients, we introduce a hierarchy measurement and use weighted average to compute total similarity. This mechanism can measure the semantic distance of intrusion alerts with finer granularity than the common similarity measurement. The experimental results in this paper show that using fuzzy clustering method can reconstruct attack scenario which are wrecked by missed attacks.
引用
收藏
页码:328 / 333
页数:6
相关论文
共 50 条
  • [1] Clustering Based on Fuzzy Rule-Based Classifier
    Behera, D. K.
    Patra, P. K.
    [J]. COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 1, 2015, 31 : 233 - 242
  • [2] Fuzzy rule clustering
    Salgado, P
    [J]. 2001 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: E-SYSTEMS AND E-MAN FOR CYBERNETICS IN CYBERSPACE, 2002, : 2421 - 2427
  • [3] Optimal Configuration of Microgrids Based on Fuzzy Scenario Clustering
    Li, Haipeng
    Mi, Yang
    Deng, Jin
    Chen, Boyang
    [J]. 2022 4TH ASIA ENERGY AND ELECTRICAL ENGINEERING SYMPOSIUM (AEEES 2022), 2022, : 133 - 137
  • [4] An effective attack scenario construction model based on identification of attack steps and stages
    Alhaj, Taqwa Ahmed
    Siraj, Maheyzah Md
    Zainal, Anazida
    Idris, Inshirah
    Nazir, Anjum
    Elhaj, Fatin
    Darwish, Tasneem
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1481 - 1496
  • [5] An effective attack scenario construction model based on identification of attack steps and stages
    Taqwa Ahmed Alhaj
    Maheyzah Md Siraj
    Anazida Zainal
    Inshirah Idris
    Anjum Nazir
    Fatin Elhaj
    Tasneem Darwish
    [J]. International Journal of Information Security, 2023, 22 : 1481 - 1496
  • [6] Identification of Fuzzy Rule-Based Models With Collaborative Fuzzy Clustering
    Hu, Xingchen
    Shen, Yinghua
    Pedrycz, Witold
    Wang, Xianmin
    Gacek, Adam
    Liu, Bingsheng
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (07) : 6406 - 6419
  • [7] Fuzzy Rule Based Clustering for Gene Expression Data
    Sinaee, Mehrnoosh
    Mansoori, Eghbal G.
    [J]. FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION (ISMS 2013), 2013, : 7 - 11
  • [8] FRBC: A Fuzzy Rule-Based Clustering Algorithm
    Mansoori, Eghbal G.
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2011, 19 (05) : 960 - 971
  • [9] Ant Spatial Clustering Based on Fuzzy IF-THEN Rule
    Chen, Yingxian
    Han, Mingfeng
    Zhu, Huawei
    [J]. FUZZY INFORMATION AND ENGINEERING 2010, VOL 1, 2010, 78 : 563 - +
  • [10] Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
    Wang W.
    Du X.
    Shan D.
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (01): : 1 - 17