A data mining approach to generating network attack graph for intrusion prediction

被引:29
|
作者
Li, Zhi-tang [1 ]
Lei, Jie [1 ]
Wang, Li [1 ]
Li, Dong [1 ]
机构
[1] Huazhong Univ Sci & Technol, Dept Comp Sci, Wuhan 430074, Hubei, Peoples R China
关键词
D O I
10.1109/FSKD.2007.15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A network attack graph provides a global view of all possible sequences of exploits which an intruder may use to penetrate a system. Attack graphs can be generated by model checking techniques or intrusion alert Correlation. In this paper we proposed a data mining approach to generating attack graphs. Through association rule mining, the algorithm generates multi-step attack patterns from historical intrusion alerts which comprise the attack graphs. The algorithm also calculates the predictability of each attack scenario in the attack graph which represents the probability for the corresponding attack scenario to be the precursor of future attacks. Then the real-time intrusion alerts can be correlated to attack scenarios and ranked by the predictability scores. The ranking result can help identify the appropriate evidence for intrusion prediction from a large volume of raw intrusion alerts. The approach is validated by DARPA 2000 and DARPA 1999 intrusion detection evaluation datasets.
引用
收藏
页码:307 / 311
页数:5
相关论文
共 50 条
  • [41] A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part
    Wu, Kongpei
    Qu, Huiqin
    Huang, Conggui
    FUTURE INTERNET, 2023, 15 (04):
  • [42] Data Mining Intrusion Detection in Vehicular Ad Hoc Network
    Liu, Xiaoyun
    Yan, Gongjun
    Rawat, Danda B.
    Deng, Shugang
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (07) : 1719 - 1726
  • [43] An Evaluation of Data Mining Classification Models for Network Intrusion Detection
    So-In, Chakchai
    Mongkonchai, Nutakarn
    Aimtongkham, Phet
    Wijitsopon, Kasidit
    Rujirakul, Kanokmon
    2014 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND IT'S APPLICATIONS (DICTAP), 2014, : 90 - 94
  • [44] Network Intrusion Detection System Model Based on Data Mining
    Zhao, Yanjie
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 155 - 160
  • [45] Data mining tools -a case study for network intrusion detection
    Hosseini, Soodeh
    Sardo, Saman Rafiee
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (04) : 4999 - 5019
  • [46] Network intrusion detection based on system calls and data mining
    Xinguang Tian
    Xueqi Cheng
    Miyi Duan
    Rui Liao
    Hong Chen
    Xiaojuan Chen
    Frontiers of Computer Science in China, 2010, 4 : 522 - 528
  • [47] A combined data mining approach for DDoS attack detection
    Kim, M
    Na, H
    Chae, K
    Bang, H
    Na, J
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 943 - 950
  • [48] An approach to generating testing traffic in evaluating network intrusion detection systems
    Huang, K
    Zhang, DF
    Yang, XD
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS, AND INFORMATICS, VOL XVI, PROCEEDINGS, 2004, : 511 - 515
  • [49] NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System
    Ezeife, C. I.
    Rahman, Md. Zillur
    PROCEEDINGS OF THE FOURTEENTH INTERNATIONAL DATABASE ENGINEERING & APPLICATIONS SYMPOSIUM (IDEAS '10), 2010, : 38 - 41
  • [50] Mining closed patterns in relational, graph and network data
    Garriga, Gemma C.
    Khardon, Roni
    De Raedt, Luc
    ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, 2013, 69 (04) : 315 - 342