The Parameter Optimization Based on LVPSO Algorithm for Detecting Multi-step Attacks

被引:0
|
作者
Jiang, Jianguo [1 ]
Wang, Qiwen [1 ,2 ]
Shi, Zhixin [1 ]
Lv, Bin [1 ]
Fan, Wei [1 ]
Peng, Xiao [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-step attacks; HMM; Particle swarm optimization; MODELS;
D O I
10.1145/3310273.3323048
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
How to detect intrusion attacks is a big challenge for network administrators since the attacks involve multi-step nowadays. The hidden markov model (HMM) is widely used in the field of multi-step attacks detection. However, the existing traditional Baum-Welch algorithm of HMM has two shortcomings: one is the number of attack states need to be determined in advance, the other is the algorithm may make the parameters converge to a local (not overall) optimal solution. In this paper, we propose a novel LVPSO-HMM algorithm based on variable length particle swarm optimization, which solves the shortcomings mentioned above. Concretely, it can optimize the number of attack states when the attacks state is unknown and it can make the model parameters converge to a global optimal solution. Then, we present a multi-step attack detection model architecture whose main idea is, when the number of attack states is unknown in the actual network environment LVPSO-HMM algorithm is used to solve the problem of relying on prior knowledge in current detection. Experiments on the well-known Darpa2000 dataset verify the efficiency of the method.
引用
收藏
页码:24 / 31
页数:8
相关论文
共 50 条
  • [1] Application of Multi-Step Parameter Estimation Method Based on Optimization Algorithm in Sacramento Model
    Zhang, Gang
    Xie, Tuo
    Zhang, Lei
    Hua, Xia
    Liu, Fuchao
    WATER, 2017, 9 (07)
  • [2] Causal knowledge analysis for detecting and modeling multi-step attacks
    Ramaki, Ali Ahmadian
    Rasoolzadegan, Abbas
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6042 - 6065
  • [3] Detecting Multi-Step Attacks: A Modular Approach for Programmable Data Plane
    Laraba, Abir
    Francois, Jerome
    Chrisment, Isabelle
    Chowdhury, Shihabur Rahman
    Boutaba, Raouf
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [4] Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking
    Shevrin, Ilia
    Margalit, Oded
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6025 - 6042
  • [5] Reactive Power Optimization Calculation Based on Multi-step Q(λ) Learning Algorithm
    Hu Xi-bing
    Yu Tao
    POWER AND ENERGY ENGINEERING CONFERENCE 2010, 2010, : 449 - 452
  • [6] UAV path re-planning of multi-step optimization based on LRTA* algorithm
    Fu, Li
    Zhu, Kun
    2011 INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND NEURAL COMPUTING (FSNC 2011), VOL I, 2011, : 295 - 298
  • [7] Multi-step Jailbreaking Privacy Attacks on ChatGPT
    Li, Haoran
    Guo, Dadi
    Fan, Wei
    Xu, Mingshi
    Huang, Jie
    Meng, Fanpu
    Song, Yangqiu
    FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS - EMNLP 2023, 2023, : 4138 - 4153
  • [8] Processing of IDS alerts in multi-step attacks
    Bajtos, Tomas
    Sokol, Pavol
    Kurimsky, Frantisek
    SOFTWARE IMPACTS, 2024, 19
  • [9] Detection algorithm for multi-step attack based on CTPN
    Yan, Fen
    Huang, Hao
    Yin, Xin-Chun
    Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1383 - 1391
  • [10] Morwilog: an ACO-based System for Outlining Multi-Step Attacks
    Navarro-Lara, Julio
    Deruyver, Aline
    Parrend, Pierre
    PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,