Using vulnerability analysis to model attack scenario for collaborative intrusion detection

被引:0
|
作者
Liu, Xuejiao [1 ]
Xiao, Debao [1 ]
机构
[1] Huazhong Normal Univ, Dept Comp Sci, Wuhan 430079, Peoples R China
关键词
vulnerability analysis; verification pattern; attack scenario; intrusion detection;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Intrusion detection is an important part of network security protection. Traditional intrusion detection systems (IDSs) only focus on low-level attacks and raise alerts independently, though there may be logical connections between them. At the same time, the amount of alerts becomes unmanageable including actual alerts mixed with false alerts. Therefore, improved techniques are needed. The general idea is to introduce collaboration achieved by taking advantage of vulnerability analysis as contextual information and thus enable IDSs to correctly identify successful attacks while simultaneously reducing the number of false positives and providing a stronger validation attack scenario. In particular, with the verification pattern with precondition and effect of successful attack and necessary context (mainly modeled as host and connectivity information), the architecture that proposes in this paper can reduce the false alert rate and identify true alerts corresponding to successful attacks to construct attack scenario. Through the experimental results with DARPA Data Sets 2000 from Lincoln laboratory and the Treasure Hunt Dataset, it demonstrates the potential of the proposed techniques.
引用
收藏
页码:1273 / 1277
页数:5
相关论文
共 50 条
  • [1] Scenario recognition based on collaborative attack modeling in intrusion detection
    Liu, Xuejiao
    Xiao, Debao
    Gu, Ting
    Xu, Hui
    [J]. IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 378 - 382
  • [2] Attack scenario reconstruction using intrusion semantics
    Barzegar, Mandiyeh
    Shajari, Mehdi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2018, 108 : 119 - 133
  • [3] Alert verification based on attack classification in collaborative intrusion detection
    Xiao, Min
    Xiao, Debao
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 739 - +
  • [4] An Intelligent Model for Vulnerability Analysis Using Attack Graph
    Wang Yi
    Xiao Jinghua
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 526 - 529
  • [5] Cooperative intrusion detection model based on scenario
    Teng, Shaohua
    Zhang, Wei
    Fu, Xiufen
    Tan, Wenwei
    [J]. PROCEEDINGS OF THE 2007 11TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2007, : 876 - +
  • [6] Real-Time Attack Scenario Detection via Intrusion Detection Alert Correlation
    Zali, Zeinab
    Hashemi, Massoud Reza
    Saidi, Hossein
    [J]. 2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 95 - 102
  • [7] Improving Performance of Classification Intrusion Detection Model by Weighted Extreme Learning Using Behavior Analysis of the Attack
    Intarasothonchun, Silada
    Srimuang, Worachai
    [J]. 2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015,
  • [8] Intrusion Attack Detection Using Firefly Optimization Algorithm and Ensemble Classification Model
    Gangula, Rekha
    Vutukuru, Murali Mohan
    Kumar, M. Ranjeeth
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (03) : 1899 - 1916
  • [9] Intrusion Attack Detection Using Firefly Optimization Algorithm and Ensemble Classification Model
    Rekha Gangula
    Murali Mohan Vutukuru
    M. Ranjeeth Kumar
    [J]. Wireless Personal Communications, 2023, 132 : 1899 - 1916
  • [10] Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning
    Ayub, Md Ahsan
    Johnson, William A.
    Talbert, Douglas A.
    Siraj, Ambareen
    [J]. 2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, : 324 - 329