A systematic survey on multi-step attack detection

被引:88
|
作者
Navarro, Julio [1 ,2 ]
Deruyver, Aline [1 ,2 ]
Parrend, Pierre [1 ,2 ,3 ]
机构
[1] Univ Strasbourg, ICube Lab, 300 Bd Sebastien Brant, F-67412 Illkirch Graffenstaden, France
[2] UNESCO Unitwin, Complex Syst Digital Campus, Paris, France
[3] ECAM Strasbourg Europe, 2 Rue Madrid, F-67300 Schiltigheim, France
关键词
Advanced persistent threat; Event correlation; Intrusion detection system; Multi-stage attack; Multi-step attack; Network security; INTRUSION DETECTION; ALERT CORRELATION; SITUATIONAL AWARENESS; REPRODUCIBLE RESEARCH; ALGORITHM; FRAMEWORK; MODELS; EVENT;
D O I
10.1016/j.cose.2018.03.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the beginning of the Internet, cyberattacks have threatened users and organisations. They have become more complex concurrently with computer networks. Nowadays, attackers need to perform several intrusion steps to reach their final objective. The set of these steps is known as multi-step attack, multi-stage attack or attack scenario. Their multi-step nature hinders intrusion detection, as the correlation of more than one action is needed to understand the attack strategy and identify the threat. Since the beginning of 2000s, the security research community has tried to propose solutions to detect this kind of threat and to predict further steps. This survey aims to gather all the publications proposing multi-step attack detection methods. We focus on methods that go beyond the detection of a symptom and try to reveal the whole structure of the attack and the links between its steps. We follow a systematic approach to bibliographic research in order to identify the relevant literature. Our effort results in a corpus of 181 publications covering 119 methods, which we describe and classify. The analysis of the publications allows us to extract some conclusions about the state of research in multi-step attack detection. As far as we know, this is the first survey fully dedicated to multi-step attack detection methods as mechanisms to reveal attack scenarios composed of digital traces left by attackers. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:214 / 249
页数:36
相关论文
共 50 条
  • [21] A wireless multi-step attack pattern recognition method for WLAN
    Chen, Guanlin
    Zhang, Yujia
    Wang, Can
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (16) : 7068 - 7076
  • [22] Corrosion detection by multi-step genetic algorithm
    Amaya, K.
    Ridha, M.
    Aoki, S.
    [J]. SIMULATION OF ELECTROCHEMICAL PROCESSES II, 2007, 54 : 299 - +
  • [23] A Multi-Step Attack Pattern Discovery Method Based on Graph Mining
    Xu Jinghu
    Li Aiping
    Zhao Hui
    Yin Hong
    [J]. PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 376 - 380
  • [24] Introducing a New Alert Data Set for Multi-Step Attack Analysis
    Landauer, Max
    Skopik, Florian
    Wurzenberger, Markus
    [J]. PROCEEDINGS OF 17TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP, CSET 2024, 2024, : 32 - 44
  • [25] A multi-step key recovery attack on reduced round Salsa and ChaCha
    Garai, Hirendra Kumar
    Dey, Sabyasachi
    [J]. CRYPTOLOGIA, 2024,
  • [26] An Unsupervised Two-Layer Multi-Step Network Attack Detector
    Wang, Su
    Wang, Zhiliang
    Yin, Xia
    Shi, Xingang
    [J]. IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1308 - 1309
  • [27] MAAC: Novel Alert Correlation Method To Detect Multi-step Attack
    Wang, Xiaoyu
    Gong, Xiaorui
    Yu, Lei
    Liu, Jian
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 726 - 733
  • [28] A multi-step attack identification and correlation method based on multi-information fusion
    Liao, Niandong
    Wang, Jiaxun
    Guan, Jiayu
    Fan, Hejun
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 117
  • [29] A Method of Maneuver Detection Based on Multi-step Innovation
    Wang Yong
    [J]. 9TH INTERNATIONAL CONFERENCE ON MECHATRONICS AND MANUFACTURING (ICMM 2018), 2018, 361
  • [30] MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion
    Mao, Beifeng
    Liu, Jing
    Lai, Yingxu
    Sun, Motong
    [J]. COMPUTER NETWORKS, 2021, 198