期刊文献+

A graph based system for multi-stage attacks recognition

A graph based system for multi-stage attacks recognition
下载PDF
导出
摘要 Building attack scenario is one of the most important aspects in network security.This paper pro-posed a system which collects intrusion alerts,clusters them as sub-attacks using alerts abstraction,ag-gregates the similar sub-attacks,and then correlates and generates correlation graphs.The scenarios wererepresented by alert classes instead of alerts themselves so as to reduce the required rules and have the a-bility of detecting new variations of attacks.The proposed system is capable of passing some of the missedattacks.To evaluate system effectiveness,it was tested with different datasets which contain multi-stepattacks.Compressed and easily understandable Correlation graphs which reflect attack scenarios were gen-erated.The proposed system can correlate related alerts,uncover the attack strategies,and detect newvariations of attacks. Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the a-bility of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were gen-erated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.
出处 《High Technology Letters》 EI CAS 2008年第2期167-173,共7页 高技术通讯(英文版)
基金 the National High Technology Research and Development Programme of China(2006AA01Z452)
关键词 网络安全 通信技术 侵入探测 多级入侵 network security, intrusion detection, alert correlation, attack graph, scenario, clus-tering
  • 相关文献

参考文献10

  • 1Dain O M,Cunningham R K.Fusing a heterogeneous alert stream into scenarios[].Proceedings of the ACM Workshop on Data Mining for Security Applications.2001
  • 2Qin X,Lee W.Statistical causality analysis of INFOSEC alert data[].Proceedings of the ~(th) International Symposium on Recent Advances in Intrusion Detection (RAID ).2003
  • 3DEFCON captures the flag (CTF) contest. http://ccff.shmoo.com/data/cctf-defcon8/ . 2000
  • 4Valdes A,Skinner K.Probabilistic alert correlation[].Proceedings of the th International Symposium on Recent Advances in Intrusion Detection (RAID).2001
  • 5P. Ning,Y. Cui,D. S. Reeves,and D. Xu."Techniques and tools for analyzing intrusion alerts,"[].ACM Transactions on Information and System Security.2004
  • 6Valeur F,Vigna G,Kruegel C, et al.Comprehensive Approach to Intrusion Detection Alert Correlation[ J][].IEEE Transactions on Dependable and Secure Computing.2004
  • 7Snort Signature Database. http:www.snort.org/cgi-bin/done.cgi .
  • 8MIT Lincoln Lab.2000 DARPA intrusion detection scenario specific datasets. http://www.ll.mit.edu/ IST/ideval/data/2000/2000_data_index.html . 2007
  • 9Sourcefire.Snort:the open source network intrusion detec-tion system. http://www.snort.org . 2005
  • 10AT&T Research Labs.Graphviz-Open Source Graph Layout and Drawing Software. http://www.research.att.com/sw/tools/graphviz . 2006

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部