Extracting Attack Narratives from Traffic Datasets

被引:0
|
作者
Mireles, Jose David [1 ]
Cho, Jin-Hee [2 ]
Xu, Shouhuai [1 ]
机构
[1] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[2] US Army Res Lab, Adelphi, MD USA
关键词
Cyber attacks; attack narratives; attack signatures; cyber attribution; attack attribution; data analytics; ALERT CORRELATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Parsing through large amounts of network traffic to extract attack signatures is a complex and time consuming process. It is an even harder process to piece together those signatures to formulate an attack narrative. An attack narrative can be defined as the set of attack signatures, that when combined provides an overview of the attack and the attacker themselves. In this paper, we propose a framework for extracting attack narratives from traffic datasets. Within this framework, we propose the re-examination of packet grepping for attack signatures in network traffic as a viable, fast, and effective means to extract attack narratives from large amounts of network traffic. By combining attack signature packet grepping with Mandiant's Attack Lifecycle Model, we increase the effectiveness of packet grepping and create a methodology that is simple and powerful for constructing attack narratives. In order to show the effectiveness of the framework, we conduct a case study by using the 2015 National Collegiate Cyber Defense Competition (NCCDC) network traffic. Our preliminary results show that the framework is promising.
引用
收藏
页码:118 / 123
页数:6
相关论文
共 50 条
  • [1] Extracting Attack Sessions from Real Traffic with Intrusion Prevention Systems
    Chen, I-Wei
    Lin, Po-Ching
    Luo, Chi-Chung
    Cheng, Tsung-Huan
    Lin, Ying-Dar
    Lai, Yuan-Cheng
    Lin, Frank C.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 889 - +
  • [2] Extracting information from spatial datasets
    Jones, Andrew P.
    Lake, Iain R.
    [J]. COMPUTERS ENVIRONMENT AND URBAN SYSTEMS, 2007, 31 (01) : 1 - 3
  • [3] Extracting and validating biclusters from binary datasets
    Rodriguez-Baena, Domingo S.
    [J]. AI COMMUNICATIONS, 2013, 26 (04) : 417 - 418
  • [4] Extracting network based attack narratives through use of the cyber kill chain: A replication study
    Weathersby, Aaron
    Washington, Mark
    [J]. IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 29 - 42
  • [5] Towards the Web of Concepts: Extracting Concepts from Large Datasets
    Parameswaran, Aditya
    Garcia-Molina, Hector
    Rajaraman, Anand
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2010, 3 (01): : 566 - 577
  • [6] Extracting boundary surface of arbitrary topology from volumetric datasets
    Duan, Y
    Qin, H
    [J]. VOLUME GRAPHICS 2001, 2001, : 235 - +
  • [7] Extractor: Extracting Attack Behavior from Threat Reports
    Satvat, Kiavash
    Gjomemo, Rigel
    Venkatakrishnan, V. N.
    [J]. 2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 598 - 615
  • [8] Extracting information from narratives: An application to aviation safety reports
    Posse, Christian
    Matzke, Brett
    Anderson, Catherine
    Brothers, Alan
    Matzke, Melissa
    Ferryman, Thomas
    [J]. 2005 IEEE Aerospace Conference, Vols 1-4, 2005, : 3678 - 3690
  • [9] Integrating character networks for extracting narratives from multimodal data
    Lee, O-Joun
    Jung, Jason J.
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2019, 56 (05) : 1894 - 1923
  • [10] Experimenting with Clojure on Extracting Medication Information from Clinical Narratives
    Mohammed, Sami
    Mohammed, Sabah
    Fiaidhi, Jinan
    Li, Tengyue
    Fong, Simon
    [J]. BDIOT 2018: PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS, 2018, : 119 - 122