A data mining approach to generating network attack graph for intrusion prediction

被引:29
|
作者
Li, Zhi-tang [1 ]
Lei, Jie [1 ]
Wang, Li [1 ]
Li, Dong [1 ]
机构
[1] Huazhong Univ Sci & Technol, Dept Comp Sci, Wuhan 430074, Hubei, Peoples R China
关键词
D O I
10.1109/FSKD.2007.15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A network attack graph provides a global view of all possible sequences of exploits which an intruder may use to penetrate a system. Attack graphs can be generated by model checking techniques or intrusion alert Correlation. In this paper we proposed a data mining approach to generating attack graphs. Through association rule mining, the algorithm generates multi-step attack patterns from historical intrusion alerts which comprise the attack graphs. The algorithm also calculates the predictability of each attack scenario in the attack graph which represents the probability for the corresponding attack scenario to be the precursor of future attacks. Then the real-time intrusion alerts can be correlated to attack scenarios and ranked by the predictability scores. The ranking result can help identify the appropriate evidence for intrusion prediction from a large volume of raw intrusion alerts. The approach is validated by DARPA 2000 and DARPA 1999 intrusion detection evaluation datasets.
引用
收藏
页码:307 / 311
页数:5
相关论文
共 50 条
  • [21] Generating prediction rules for liquefaction through data mining
    Baykasoglu, Adil
    Cevik, Abduelkadir
    Ozbakir, Lale
    Kulluk, Sinem
    EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (10) : 12491 - 12499
  • [22] COATES GRAPH APPROACH FOR GENERATING SYMBOLIC NETWORK FUNCTION
    虞希清
    陆生勋
    JournalofElectronics(China), 1989, (04) : 378 - 385
  • [23] Generating Network Intrusion Detection Dataset Based on Real and Encrypted Synthetic Attack Traffic
    Ferriyan, Andrey
    Thamrin, Achmad Husni
    Takeda, Keiji
    Murai, Jun
    APPLIED SCIENCES-BASEL, 2021, 11 (17):
  • [24] Analytical Approach to Attack Graph Analysis for Network Security
    Kijsanayothin, Phongphun
    Hewett, Rattikorn
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 25 - 32
  • [25] Big Data Analytics in Cybersecurity: Network Data and Intrusion Prediction
    Wang, Lidong
    Jones, Randy
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 105 - 111
  • [26] Intrusion detection without attack knowledge: generating out -of-distribution tabular data
    Ceccarelli, Andrea
    Zoppi, Tommaso
    2023 IEEE 34TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, ISSRE, 2023, : 125 - 136
  • [27] Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation
    Chen, Yuzhong
    Liu, Zhenyu
    Liu, Yulin
    Dong, Chen
    ENTROPY, 2020, 22 (09)
  • [28] Early prediction of dementia using fMRI data with a graph convolutional network approach
    Han, Shuning
    Sun, Zhe
    Zhao, Kanhao
    Duan, Feng
    Caiafa, Cesar F.
    Zhang, Yu
    Sole-Casals, Jordi
    JOURNAL OF NEURAL ENGINEERING, 2024, 21 (01)
  • [29] Data Mining and Graph Network Deep Learning for Band Gap Prediction in Crystalline Borate Materials
    Wang, Ruihan
    Zhong, Yeshuang
    Dong, Xuehua
    Du, Meng
    Yuan, Haolun
    Zou, Yurong
    Wang, Xin
    Lin, Zhien
    Xu, Dingguo
    INORGANIC CHEMISTRY, 2023, 62 (11) : 4716 - 4726
  • [30] Data mining for network intrusion detection: A comparison of alternative methods
    Zhu, D
    Premkumar, G
    Zhang, XN
    Chu, CH
    DECISION SCIENCES, 2001, 32 (04) : 635 - 660