期刊文献+

一种新的在线攻击意图识别方法研究 被引量:6

Novel Online Attack Strategy Recognition Technique
下载PDF
导出
摘要 现有的利用入侵检测告警来构建攻击场景、识别多步攻击意图的方法存在着需要定义复杂的关联规则、过于依赖专家知识和难以发现完整场景等不足,为此提出了一种基于攻击行为序列模式挖掘方法的攻击意图识别技术.通过分析入侵告警的攻击行为序列,挖掘出多步攻击的行为模式,再进行在线的告警模式匹配和告警关联度计算来发现攻击者的攻击意图,预测攻击者的下一步攻击行为.实验结果表明,该方法可以有效的挖掘出攻击者的多步攻击行为模式,并能有效的实现在线的攻击意图识别. Large volume of security data makes it important to develop an advanced alert correlation system that can reduce alert redundancy, intelligently correlate security alerts and detect attack strategies. The existing methods of attack strategy recognition all have limited capabilities in detecting new and complete attack scenarios. The paper proposes a new method of recognizing attack plans by applying a new attack sequential pattern analysis technique to construct attack sequential pattern models from intrusion alert data offline. Then online alert sequential pattern matching'and correlativity calculation are performed to recognize real attack strategies of the attacker. Experiments show that the method can effectively recognize attack plans online and can accordingly predict next most possible attack behavior.
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第7期1347-1352,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60573120)资助 湖北省自然科学基金项目(2005ABA25)资助
关键词 入侵告警 攻击行为序列 序列模式挖掘 关联度 intrusion alert attack behavior sequence sequential pattern mining eorrelativity
  • 相关文献

参考文献8

  • 1Ning P, Cui Y, Reeves D S,et al. Techniques and tools for analyzing intrusion alerts [J]. ACM Transactions on Information and System Security, 2004,7,274.
  • 2Cuppens F, Mie'ge A. Alert correlation in a cooperative intrusion detection framework[C]. Proceedings of the 2002 IEEE symposium on security and privacy, 2002,202-215.
  • 3Cheung S, Lindqvist U, Fong M W. Modeling multistep cyber attacks for scenario recognition[Z].Washington, DC, USA, 2003, April 22-24, Volume I, 2003,284-292.
  • 4Eckmann S T, Vigna G, Kemmerer R A. STATL: an attack language for state-based intrusion detection [J]. Journal of Computer Security, 2002,10 : 71.
  • 5Hellerstein J L, Ma S, Perng C S. Discovering actionable patterns in event data[J]. IBM Systems Journal, 2002, 41:475.
  • 6Araujo C, Biazetti A, Bussani A, et al. Simplifying correlation rule creation for effective systems monitoring[C]. Proceedings of 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2004,Vol. 3278, 2004,266-268.
  • 7Qin Xin-zhou, Wenke Lee. Statistical causality of INFOSEC alert data[C]. Proceedings of Recent Advances in Intrusion Detection, RAID 2003, Lecture Notes in Computer Science, Vol. 2820, 2003,73-94.
  • 8Agrawal R,Srikant R. Mining sequential pattern[C]. Proceedings of the Int. Conference on Data Engineering,ICDE95,Vol. 1,1995,3-14.

同被引文献28

  • 1姚伟力,王锡禄,宋俊德.基于序列模式挖掘的告警相关性分析算法[J].北京邮电大学学报,2005,28(z1):82-86. 被引量:3
  • 2董晓梅,于戈,孙晶茹,王丽娜.基于频繁模式挖掘的报警关联与分析算法[J].电子学报,2005,33(8):1356-1359. 被引量:6
  • 3穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 4Sweeney L. k-anonymity: A model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Knowledge- based Systems, 2002, 10(5):557-570.
  • 5LeFevre Kristen, DeWitt David J, Ramakrishnan R. Incognito: Efficient full-domain k-anonymity[C]. Proceedings of the 24th ACM International Conference on Management of Data(SIGMOD), 2005: 49-60.
  • 6Ning Peng, Xu Dingbang. Privacy-preserving alert correlation: A concept hierarchy based approach[C]. Proceedings of the 21st Annual Computer Security Applications Conference, 2005: 537- 546.
  • 7Xu Jian, Wang Wei, Pei Jian, etal. Utility-based anonymization using local recoding[C]. Proceedings of 12th ACM SIGKDD Inter- national Conference on Knowledge Discovery and Data Mining, 2006:785-790.
  • 8R. Agrawal, and R. Srikant. Mining sequential patterns [ C ]. Proceedings of the Eleventh International Confer- ence on Data Engineering, 1995:3 -14.
  • 9Wang M F, Wu Y C, Tsai, M F, et al. Sequential pat- tern discovery for intrusion detection system[ J]. Inter- national Symposium on Communications and Informa- tion Technologies ,2010:470 - 474.
  • 10Liu .J, Pan Y, Wang K, et al. Mining frequent item sets by opportunistic projection [ C ]. Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, 2002:229 - 234.

引证文献6

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部