Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data

被引:5
|
作者
Heigl, Michael [1 ,2 ]
Weigelt, Enrico [2 ]
Urmann, Andreas [2 ]
Fiala, Dalibor [1 ]
Schramm, Martin [2 ]
机构
[1] Univ West Bohemia, Fac Appl Sci, Dept Comp Sci & Engn, Tech 8, Plzen 30100, Czech Republic
[2] Deggendorf Inst Technol, Fac Comp Sci, Inst ProtectIT, Dieter Gorlitz Pl 1, D-94469 Deggendorf, Germany
关键词
intrusion detection; alert analysis; alert correlation; outlier detection; attack scenario; streaming data; network security; ALGORITHM;
D O I
10.3390/electronics10172160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Future-oriented networking infrastructures are characterized by highly dynamic Streaming Data (SD) whose volume, speed and number of dimensions increased significantly over the past couple of years, energized by trends such as Software-Defined Networking or Artificial Intelligence. As an essential core component of network security, Intrusion Detection Systems (IDS) help to uncover malicious activity. In particular, consecutively applied alert correlation methods can aid in mining attack patterns based on the alerts generated by IDS. However, most of the existing methods lack the functionality to deal with SD data affected by the phenomenon called concept drift and are mainly designed to operate on the output from signature-based IDS. Although unsupervised Outlier Detection (OD) methods have the ability to detect yet unknown attacks, most of the alert correlation methods cannot handle the outcome of such anomaly-based IDS. In this paper, we introduce a novel framework called Streaming Outlier Analysis and Attack Pattern Recognition, denoted as SOAAPR, which is able to process the output of various online unsupervised OD methods in a streaming fashion to extract information about novel attack patterns. Three different privacy-preserving, fingerprint-like signatures are computed from the clustered set of correlated alerts by SOAAPR, which characterizes and represents the potential attack scenarios with respect to their communication relations, their manifestation in the data's features and their temporal behavior. Beyond the recognition of known attacks, comparing derived signatures, they can be leveraged to find similarities between yet unknown and novel attack patterns. The evaluation, which is split into two parts, takes advantage of attack scenarios from the widely-used and popular CICIDS2017 and CSE-CIC-IDS2018 datasets. Firstly, the streaming alert correlation capability is evaluated on CICIDS2017 and compared to a state-of-the-art offline algorithm, called Graph-based Alert Correlation (GAC), which has the potential to deal with the outcome of anomaly-based IDS. Secondly, the three types of signatures are computed from attack scenarios in the datasets and compared to each other. The discussion of results, on the one hand, shows that SOAAPR can compete with GAC in terms of alert correlation capability leveraging four different metrics and outperforms it significantly in terms of processing time by an average factor of 70 in 11 attack scenarios. On the other hand, in most cases, all three types of signatures seem to reliably characterize attack scenarios such that similar ones are grouped together, with up to 99.05% similarity between the FTP and SSH Patator attack.
引用
收藏
页数:42
相关论文
共 50 条
  • [31] Difficult Novel Class Detection in Semisupervised Streaming Data
    Zhou, Peng
    Wang, Ni
    Zhao, Shu
    Zhang, Yanping
    Wu, Xindong
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2023, 34 (10) : 6872 - 6886
  • [32] Online Pattern Recognition and Data Correction of PMU Data Under GPS Spoofing Attack
    Ancheng Xue
    Feiyang Xu
    Jingsong Xu
    Joe H.Chow
    Shuang Leng
    Tianshu Bi
    Journal of Modern Power Systems and Clean Energy, 2020, 8 (06) : 1240 - 1249
  • [33] Online Pattern Recognition and Data Correction of PMU Data Under GPS Spoofing Attack
    Xue, Ancheng
    Xu, Feiyang
    Xu, Jingsong
    Chow, Joe H.
    Leng, Shuang
    Bi, Tianshu
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2020, 8 (06) : 1240 - 1249
  • [34] A NOVEL PATTERN-RECOGNITION ALGORITHM FOR EXPLOSIVES DETECTION
    WONG, CK
    RODER, FL
    HUANG, HK
    PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS, 1983, 432 : 248 - 252
  • [35] UWFP-Outlier: an efficient frequent-pattern-based outlier detection method for uncertain weighted data streams
    Saihua Cai
    Li Li
    Qian Li
    Sicong Li
    Shangbo Hao
    Ruizhi Sun
    Applied Intelligence, 2020, 50 : 3452 - 3470
  • [36] A Novel Approach for Outlier Detection and Robust Sensory Data Model Learning
    Cursi, Francesco
    Yang, Guang-Zhong
    2019 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2019, : 4250 - 4257
  • [37] Detection of A Novel Dual Attack in Named Data Networking
    Liu, Liang
    Peng, Silin
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 1 - 8
  • [38] Data Detection and Pattern Recognition on FMS Control Charts
    Chen, Ping
    Luo, Jing
    2008 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1-5, 2008, : 1093 - +
  • [39] UWFP-Outlier: an efficient frequent-pattern-based outlier detection method for uncertain weighted data streams
    Cai, Saihua
    Li, Li
    Li, Qian
    Li, Sicong
    Hao, Shangbo
    Sun, Ruizhi
    APPLIED INTELLIGENCE, 2020, 50 (10) : 3452 - 3470
  • [40] WMFP-Outlier: An Efficient Maximal Frequent-Pattern-Based Outlier Detection Approach for Weighted Data Streams
    Cai, Saihua
    Li, Qian
    Li, Sicong
    Yuan, Gang
    Sun, Ruizhi
    INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (04): : 505 - 521