Multi-layer episode filtering for the multi-step attack detection

被引:27
|
作者
Soleimani, Mahbobeh [1 ]
Ghorbani, Ali A. [1 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Informat Secur Ctr Excellence, Fredericton, NB E3B 5A3, Canada
关键词
Alert correlation; Multi-step attack; Intrusion detection system;
D O I
10.1016/j.comcom.2012.04.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The discovery of sophisticated attack sequences demands the development of significantly better alert correlation algorithms. Most of the proposed approaches in the area of multi-step attack detection have limited capabilities because they rely on various forms of predefined knowledge of attacks or attack transition patterns using attack modeling language or pre-and post-conditions of individual attacks. Therefore, those approaches cannot recognize a correlation when an attack is new or the relationship between attacks is new. In this research, we take a different view and consider alert correlation as the problem of inferring an intruder's actions as alert patterns that are constructed progressively. The work is based on a multi-layer episode mining and filtering algorithm. A decision-tree-based method is used for learning specifications of each attack pattern and detecting them in alert streams. We also used a Correlation Weight Matrix (CWM) for encoding correlation strength between attack types in the attack scenarios. One of the distinguishing features of our proposed technique is detecting novel multi-step attack scenarios, using a rule prediction method. The results have shown that our approach can effectively discover known and unknown attack strategies with high accuracy. We achieved more than 90% reduction in the number of discovered patterns while more than 95% of final patterns were actual patterns. Furthermore, our rule prediction capability showed a precise forecasting ability in guessing future alerts. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:1368 / 1379
页数:12
相关论文
共 50 条
  • [21] A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System
    Zhang, Hua
    Jin, Xueqi
    Li, Ying
    Jiang, Zhengwei
    Liang, Ye
    Jin, Zhengping
    Wen, Qiaoyan
    IEEE ACCESS, 2020, 8 (08) : 1031 - 1047
  • [22] Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection
    Parrend, Pierre
    Navarro, Julio
    Guigou, Fabio
    Deruyver, Aline
    Collet, Pierre
    EURASIP JOURNAL ON INFORMATION SECURITY, 2018,
  • [23] Deep Learning Multi-layer Fusion for an Accurate Iris Presentation Attack Detection
    Fang, Meiling
    Damer, Naser
    Boutros, Fadi
    Kirchbuchner, Florian
    Kuijper, Arjan
    PROCEEDINGS OF 2020 23RD INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION 2020), 2020, : 233 - 240
  • [24] Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling
    Liu, Zhijie
    Wang, Chongjun
    Chen, Shifu
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 214 - +
  • [25] Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation
    Chen, Junhan
    Liang, Rufeng
    Zhang, Man
    Zheng, Chengcong
    Huang, Xun
    Lu, Hui
    Yu, Xiang
    Tian, Zhihong
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 398 - 402
  • [26] An Attack Graph-based On-line Multi-step Attack Detector
    Angelini, Marco
    Bonomi, Silvia
    Borzi, Emanuele
    Del Pozzo, Antonella
    Lenti, Simone
    Santucci, Giuseppe
    ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
  • [27] Cascading Failure Model Considering Multi-Step Attack Strategy
    Guo, Hengdao
    Iu, Herbert Ho-Ching
    Fernando, Tyrone
    Zheng, Ciyan
    Zhang, Xi
    Tse, Chi K.
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [28] A Privacy-Preserving Multi-step Attack Correlation Algorithm
    Xian, Minyi
    Zhang, Yongtang
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 1389 - 1393
  • [29] A wireless multi-step attack pattern recognition method for WLAN
    Chen, Guanlin
    Zhang, Yujia
    Wang, Can
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (16) : 7068 - 7076
  • [30] Corrosion detection by multi-step genetic algorithm
    Amaya, K.
    Ridha, M.
    Aoki, S.
    SIMULATION OF ELECTROCHEMICAL PROCESSES II, 2007, 54 : 299 - +