Using vulnerability analysis to model attack scenario for collaborative intrusion detection

被引:0
|
作者
Liu, Xuejiao [1 ]
Xiao, Debao [1 ]
机构
[1] Huazhong Normal Univ, Dept Comp Sci, Wuhan 430079, Peoples R China
关键词
vulnerability analysis; verification pattern; attack scenario; intrusion detection;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Intrusion detection is an important part of network security protection. Traditional intrusion detection systems (IDSs) only focus on low-level attacks and raise alerts independently, though there may be logical connections between them. At the same time, the amount of alerts becomes unmanageable including actual alerts mixed with false alerts. Therefore, improved techniques are needed. The general idea is to introduce collaboration achieved by taking advantage of vulnerability analysis as contextual information and thus enable IDSs to correctly identify successful attacks while simultaneously reducing the number of false positives and providing a stronger validation attack scenario. In particular, with the verification pattern with precondition and effect of successful attack and necessary context (mainly modeled as host and connectivity information), the architecture that proposes in this paper can reduce the false alert rate and identify true alerts corresponding to successful attacks to construct attack scenario. Through the experimental results with DARPA Data Sets 2000 from Lincoln laboratory and the Treasure Hunt Dataset, it demonstrates the potential of the proposed techniques.
引用
收藏
页码:1273 / 1277
页数:5
相关论文
共 50 条
  • [41] Collaborative Approach for a MANET Intrusion Detection System using Multilateration
    Carvalho, Jcronymo M. A.
    Costa, Paulo C. G.
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2016, : 59 - 65
  • [42] A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure
    Liu, Xiaoxue
    Zhu, Peidong
    Zhang, Yan
    Chen, Kan
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (05) : 2435 - 2443
  • [43] XSS Vulnerability Detection Using Optimized Attack Vector Repertory
    Guo, Xiaobing
    Jin, Shuyuan
    Zhang, Yaxing
    [J]. 2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, 2015, : 29 - 36
  • [44] Employing Attack Graphs for Intrusion Detection
    Capobianco, Frank
    George, Rahul
    Huang, Kaiming
    Jaeger, Trent
    Krishnamurthy, Srikanth
    Qian, Zhiyun
    Payer, Mathias
    Yu, Paul
    [J]. NSPW'19: PROCEEDINGS OF THE NEW SECURITY PARADIGMS WORKSHOP, 2019, : 16 - 30
  • [45] Attack and intrusion detection in cloud computing using an ensemble learning approach
    Singh P.
    Ranga V.
    [J]. International Journal of Information Technology, 2021, 13 (2) : 565 - 571
  • [46] Predictor Selection and Attack Classification using Random Forest for Intrusion Detection
    Ambikavathi, Chandramohan
    Srivatsa, Srinivasa Krishna
    [J]. JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2020, 79 (05): : 365 - 368
  • [47] Web Attack Intrusion Detection System Using Machine Learning Techniques
    Baklizi, Mahmoud Khalid
    Atoum, Issa
    Alkhazaleh, Mohammad
    Kanaker, Hasan
    Abdullah, Nibras
    Al-Wesabi, Ola A.
    Otoom, Ahmed Ali
    [J]. INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2024, 20 (03) : 24 - 38
  • [48] Using attack-specific feature subsets for network intrusion detection
    Shin, Sung Woo
    Lee, Chi Hoon
    [J]. AI 2006: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 4304 : 305 - +
  • [49] Traffic and attack pattern analysis for multiagent distributed intrusion detection system
    Kolaczek, Grzegorz
    Juszczyszyn, Krzysztof
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (ISKE 2007), 2007,
  • [50] Black Hole attack Detection using Fuzzy based Intrusion Detection Systems in MANET
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    [J]. 10TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2019) / THE 2ND INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40 2019) / AFFILIATED WORKSHOPS, 2019, 151 : 1176 - 1181