A data mining approach to generating network attack graph for intrusion prediction

被引:29
|
作者
Li, Zhi-tang [1 ]
Lei, Jie [1 ]
Wang, Li [1 ]
Li, Dong [1 ]
机构
[1] Huazhong Univ Sci & Technol, Dept Comp Sci, Wuhan 430074, Hubei, Peoples R China
关键词
D O I
10.1109/FSKD.2007.15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A network attack graph provides a global view of all possible sequences of exploits which an intruder may use to penetrate a system. Attack graphs can be generated by model checking techniques or intrusion alert Correlation. In this paper we proposed a data mining approach to generating attack graphs. Through association rule mining, the algorithm generates multi-step attack patterns from historical intrusion alerts which comprise the attack graphs. The algorithm also calculates the predictability of each attack scenario in the attack graph which represents the probability for the corresponding attack scenario to be the precursor of future attacks. Then the real-time intrusion alerts can be correlated to attack scenarios and ranked by the predictability scores. The ranking result can help identify the appropriate evidence for intrusion prediction from a large volume of raw intrusion alerts. The approach is validated by DARPA 2000 and DARPA 1999 intrusion detection evaluation datasets.
引用
收藏
页码:307 / 311
页数:5
相关论文
共 50 条
  • [31] Data mining for network intrusion detection: A comparison of alternative methods
    Zhu, D
    Premkumar, G
    Zhang, XN
    Chu, CH
    DECISION SCIENCES, 2001, 32 (04) : 635 - 660
  • [32] Applied Research on Data Mining Algorithm in Network Intrusion Detection
    Xue, Ming
    Zhu, Changjun
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 275 - +
  • [33] AN INTELLIGENT NETWORK INTRUSION DETECTION USING DATA MINING TECHNIQUES
    Shukran, Mohd Afizi Mohd
    Maskat, Kamaruzaman
    JURNAL TEKNOLOGI, 2015, 76 (12): : 127 - 131
  • [34] Data Mining Based Network Intrusion Detection System: A Survey
    Helali, Rasha G. Mohammed
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 501 - 505
  • [35] Data Mining for Network Intrusion Detection System in Real Time
    Peng, Tao
    Zuo, Wanli
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 173 - 177
  • [36] A Model of Intrusion Detection Based on Data Mining in Campus Network
    Qi Bei
    Dong Yun-feng
    NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 317 - +
  • [37] Research on a Network Intrusion Detection System Based on Data Mining
    Fang, Zhongjin
    Zhou, Shu
    2012 THIRD INTERNATIONAL CONFERENCE ON THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (ICTMF 2012), 2013, 38 : 204 - 209
  • [38] Data mining approaches for signatures search in network intrusion detection
    Hu Zheng Bing
    Shirochin, V. P.
    2005 IEEE INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2005, : 392 - 398
  • [39] A data mining approach to landslide prediction
    Souza, FT
    Ebecken, NFF
    DATA MINING V: DATA MINING, TEXT MINING AND THEIR BUSINESS APPLICATIONS, 2004, 10 : 423 - 432
  • [40] Network intrusion detection based on system calls and data mining
    Tian, Xinguang
    Cheng, Xueqi
    Duan, Miyi
    Liao, Rui
    Chen, Hong
    Chen, Xiaojuan
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04): : 522 - 528