An Attribution of Cyberattack using Association Rule Mining (ARM)

被引:0
|
作者
Abu, Md Sahrom [1 ]
Ariffin, Aswami [1 ]
Selamat, Siti Rahayu [2 ]
Yusof, Robiah [2 ]
机构
[1] Cybersecur Malaysia, Malaysian Comp Emergency Response Team, Cyberjaya, Selangor De, Malaysia
[2] Univ Teknikal Malaysia Melaka, Fac Informat Technol & Commun, Durian Tunggal, Melaka, Malaysia
关键词
CTI; association rule mining; Apriori Algorithm; attribution; interestingness measures;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid development of computer networks and information technology, an attacker has taken advantage to manipulate the situation to launch a complicated cyberattack. This complicated cyberattack causes a lot of problems among the organization because it requires an effective cyberattack attribution to mitigate and reduce the infection rate. Cyber Threat Intelligence (CTI) has gain wide coverage from the media due to its capability to provide CTI feeds from various data sources that can be used for cyberattack attribution. In this paper, we study the relationship of basic Indicator of Compromise (IOC) based on a network traffic dataset from a data mining approach. This dataset is obtained using a crawler that is deployed to pull security feed from Shadowserver. Then an association analysis method using Apriori Algorithm is implemented to extract rules that can discover interesting relationship between large sets of data items. Finally, the extracted rules are evaluated over the factor of interestingness measure of support, confidence and lift to quantify the value of association rules generated with Apriori Algorithm. By implementing the Apriori Algorithm in Shadowserver dataset, we discover some association rules among several IOC which can help attribute the cyberattack.
引用
收藏
页码:352 / 358
页数:7
相关论文
共 50 条
  • [1] An attribution of cyberattack using association rule mining (ARM)
    Abu M.S.
    Ariffin A.
    Selamat S.R.
    Yusof R.
    Intl. J. Adv. Comput. Sci. Appl., 2020, 2 (352-358): : 352 - 358
  • [2] Formulation of Association Rule Mining (ARM) for an Effective Cyber Attack Attribution in Cyber Threat Intelligence (CTI)
    Abu, Md Sahrom
    Ariffin, Aswami
    Selamat, Siti Rahayu
    Yusof, Robiah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (04) : 134 - 143
  • [3] Decentralized Cyberattack Attribution
    Eichensehr, Kristen E.
    AJIL UNBOUND, 2019, 113 : 213 - 217
  • [4] Risk analysis of Arctic navigation using text mining (TM) and improved association rule mining (ARM) methods
    Jin, Liufeng
    Li, Pengchang
    Wang, Yuhong
    Yang, Zaili
    REGIONAL STUDIES IN MARINE SCIENCE, 2025, 81
  • [5] Association rule mining using treap
    Anand, H. S.
    Vinodchandra, S. S.
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2018, 9 (04) : 589 - 597
  • [6] Association rule mining using treap
    H. S. Anand
    S. S. Vinodchandra
    International Journal of Machine Learning and Cybernetics, 2018, 9 : 589 - 597
  • [7] Using Dynamic Data Mining in Association Rule Mining
    Qaddoum, Kifaya
    MESM '2006: 9TH MIDDLE EASTERN SIMULATION MULTICONFERENCE, 2008, : 89 - 92
  • [8] The Analysis of Drug Adverse Event using Association Rule Mining (ARM) in Regional Pharmacovigilance Center
    Shin, Dong Hoon
    Yu, Gyeong Im
    Kim, Yoon Nyun
    Son, Chang Sik
    Seo, Suk Tae
    Kim, Min Soo
    Lee, Mi Young
    Kim, Yeo Hyang
    Jung, Sung Won
    Jang, Hyeok Won
    Lee, Hyeon Ah
    Bae, Eun Young
    Seo, Kyung Mi
    Jo, Jae Wi
    Kim, Sang Hyon
    PHARMACOEPIDEMIOLOGY AND DRUG SAFETY, 2011, 20 : S346 - S346
  • [9] The Law and Politics of Cyberattack Attribution
    Eichensehr, Kristen E.
    UCLA LAW REVIEW, 2020, 67 (03) : 520 - 598
  • [10] Association rule mining using list representation
    Wang, F
    Helian, N
    Yip, YJ
    DATA MINING IV, 2004, 7 : 159 - 168