A data mining approach to generating network attack graph for intrusion prediction

被引:29
|
作者
Li, Zhi-tang [1 ]
Lei, Jie [1 ]
Wang, Li [1 ]
Li, Dong [1 ]
机构
[1] Huazhong Univ Sci & Technol, Dept Comp Sci, Wuhan 430074, Hubei, Peoples R China
关键词
D O I
10.1109/FSKD.2007.15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A network attack graph provides a global view of all possible sequences of exploits which an intruder may use to penetrate a system. Attack graphs can be generated by model checking techniques or intrusion alert Correlation. In this paper we proposed a data mining approach to generating attack graphs. Through association rule mining, the algorithm generates multi-step attack patterns from historical intrusion alerts which comprise the attack graphs. The algorithm also calculates the predictability of each attack scenario in the attack graph which represents the probability for the corresponding attack scenario to be the precursor of future attacks. Then the real-time intrusion alerts can be correlated to attack scenarios and ranked by the predictability scores. The ranking result can help identify the appropriate evidence for intrusion prediction from a large volume of raw intrusion alerts. The approach is validated by DARPA 2000 and DARPA 1999 intrusion detection evaluation datasets.
引用
收藏
页码:307 / 311
页数:5
相关论文
共 50 条
  • [1] Attack scenario reconstruction approach using attack graph and alert data mining
    Hu, Hao
    Liu, Jing
    Zhang, Yuchen
    Liu, Yuling
    Xu, Xiaoyu
    Tan, Jinglei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54 (54)
  • [2] A rough neuro data mining approach for network intrusion detection
    Bhaskar, T
    Kamath, BN
    DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 534 - 534
  • [3] NETWORK ATTACK PATH PREDICTION BASED ON VULNERABILITY DATA AND KNOWLEDGE GRAPH
    Wang, Yifan
    Sun, Zhi
    Han, Ye
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2021, 17 (05): : 1717 - 1730
  • [4] A New Data-Mining Based Approach for Network Intrusion Detection
    Dartigue, Christine
    Jang, Hyun Ik
    Zeng, Wenjun
    2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2009, : 372 - 377
  • [5] Approach Research on the Techniques for Network Intrusion Detection Based on Data Mining
    Gong Lina
    Xu Tao
    Zhang Wei
    Li XuHong
    Wang Xia
    Pan Wenwen
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 2133 - 2136
  • [6] A Graph Theoretical Methodology for Network Intrusion Fingerprinting and Attack Attribution
    Easttom, Chuck
    INTELLIGENT COMPUTING, VOL 3, 2022, 508 : 550 - 580
  • [7] A network attack path prediction method using attack graph
    Liu, Xuguang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [8] Research of Data mining in Intrusion Detection System and the uncertainty of the attack
    Liu, Wei
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1305 - 1308
  • [9] Data Mining Implementation for Monitoring Network Intrusion
    Andarrachmi, Annisa
    Wibowo, Wahyu Catur
    2019 3RD INTERNATIONAL CONFERENCE ON INFORMATICS AND COMPUTATIONAL SCIENCES (ICICOS 2019), 2019,
  • [10] Network intrusion intention analysis model based on Bayesian attack graph
    Luo Z.
    Yang X.
    Liu J.
    Xu R.
    1600, Editorial Board of Journal on Communications (41): : 160 - 169