Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling

被引:18
|
作者
Liu, Zhijie [1 ]
Wang, Chongjun
Chen, Shifu
机构
[1] Nanjing Univ, Natl Key Lab Novel Software Technol, Nanjing 210093, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/ISA.2008.11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most cyber-attacks are not single attack actions. They are multi-step attacks composed by a set of attack actions. Although techniques used by attackers can be diverse, attack patterns are generally finite. So we need to find attack steps that are correlated in an attack scenario. By studying the patterns of multi-step cyber attacks, an algorithm is presented for correlating multi-step cyber attacks and constructing attack scenario system based on modeling multi-step cyber attacks. When alerts appear, the algorithm turns them into corresponding attack models based on the knowledge base and correlates them, whether alert or not is based on the weighted cost in the attack path graph and the attack degree of the corresponding host. And attack scenarios can be constructed by correlating the attack path graphs. Moreover, the model can detect intrusion alerts in real time and revise the attack scenarios. Experiments on the DARPA IDS test dataset show the validity of the algorithm.
引用
收藏
页码:214 / +
页数:2
相关论文
共 50 条
  • [1] An Attack Graph-based On-line Multi-step Attack Detector
    Angelini, Marco
    Bonomi, Silvia
    Borzi, Emanuele
    Del Pozzo, Antonella
    Lenti, Simone
    Santucci, Giuseppe
    [J]. ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
  • [2] A Multi-Step Attack Pattern Discovery Method Based on Graph Mining
    Xu Jinghu
    Li Aiping
    Zhao Hui
    Yin Hong
    [J]. PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 376 - 380
  • [3] MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios
    Cheng, Zijun
    Sun, Degang
    Wang, Leiqi
    Lv, Qiujian
    Wang, Yan
    [J]. 2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022), 2022,
  • [4] A wireless multi-step attack pattern recognition method for WLAN
    Chen, Guanlin
    Zhang, Yujia
    Wang, Can
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (16) : 7068 - 7076
  • [5] Multi-Step Attack Pattern Detection on Normalized Event Logs
    Jaeger, David
    Ussath, Martin
    Cheng, Feng
    Meinel, Christoph
    [J]. 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 2015, : 390 - 398
  • [6] Detection algorithm for multi-step attack based on CTPN
    Yan, Fen
    Huang, Hao
    Yin, Xin-Chun
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1383 - 1391
  • [7] Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation
    Chen, Junhan
    Liang, Rufeng
    Zhang, Man
    Zheng, Chengcong
    Huang, Xun
    Lu, Hui
    Yu, Xiang
    Tian, Zhihong
    [J]. 2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 398 - 402
  • [8] A systematic survey on multi-step attack detection
    Navarro, Julio
    Deruyver, Aline
    Parrend, Pierre
    [J]. COMPUTERS & SECURITY, 2018, 76 : 214 - 249
  • [9] MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion
    Mao, Beifeng
    Liu, Jing
    Lai, Yingxu
    Sun, Motong
    [J]. COMPUTER NETWORKS, 2021, 198
  • [10] RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection
    Ramaki, Ali Ahmadian
    Amini, Morteza
    Atani, Reza Ebrahimi
    [J]. COMPUTERS & SECURITY, 2015, 49 : 206 - 219