Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths

被引:93
|
作者
Sun, Xiaoyan [1 ]
Dai, Jun [1 ]
Liu, Peng [2 ]
Singhal, Anoop [3 ]
Yen, John [2 ]
机构
[1] Calif State Univ Sacramento, Dept Comp Sci, Sacramento, CA 95819 USA
[2] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
[3] Natl Inst Stand & Technol, Comp Secur Div, Gaithersburg, MD 20899 USA
基金
美国国家科学基金会;
关键词
Intrusion detection; network security; computer security; probability; Bayesian networks; system call; zero-day attack; INTRUSION DETECTION; SECURITY RISK; SYSTEM; GENERATION;
D O I
10.1109/TIFS.2018.2821095
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Enforcing a variety of security measures (such as intrusion detection systems, and so on) can provide a certain level of protection to computer networks. However, such security practices often fall short in face of zero-day attacks. Due to the information asymmetry between attackers and defenders, detecting zero-day attacks remains a challenge. Instead of targeting individual zero-day exploits, revealing them on an attack path is a substantially more feasible strategy. Such attack paths that go through one or more zero-day exploits are called zero-day attack paths. In this paper, we propose a probabilistic approach and implement a prototype system ZePro for zero-day attack path identification. In our approach, a zero-day attack path is essentially a graph. To capture the zero-day attack, a dependency graph named object instance graph is first built as a supergraph by analyzing system calls. To further reveal the zero-day attack paths hidden in the supergraph, our system builds a Bayesian network based upon the instance graph. By taking intrusion evidence as input, the Bayesian network is able to compute the probabilities of object instances being infected. Connecting the high-probability-instances through dependency relations forms a path, which is the zero-day attack path. The experiment results demonstrate the effectiveness of ZePro for zero-day attack path identification.
引用
收藏
页码:2506 / 2521
页数:16
相关论文
共 50 条
  • [1] Exploring Scalable Bayesian Networks For Identification of Zero-day Attack Paths
    Patel, Ravi Nitinkumar
    Zhang, Xiaomei
    Sun, Xiaoyan
    Dai, Jun
    2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,
  • [2] Towards Probabilistic Identification of Zero-day Attack Paths
    Sun, Xiaoyan
    Dai, Jun
    Liu, Peng
    Singhal, Anoop
    Yen, John
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 64 - 72
  • [3] Zero-day Attack Identification in Streaming data using Semantics and Spark
    Pallaprolu, Sai C.
    Sankineni, Rishi
    Thevar, Muthukumar
    Karabatis, George
    Wang, Jianwu
    2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017), 2017, : 121 - 128
  • [4] Effective Defence Against Zero-Day Exploits Using Bayesian Networks
    Li, Tingting
    Hankin, Chris
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016), 2018, 10242 : 123 - 136
  • [5] Toward Zero-day Attack Identification Using Linear Data Transformation Techniques
    AlEroud, Ahmed
    Karabatis, George
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE), 2013, : 159 - 168
  • [6] Zero-Day Attack Detection using Ensemble Technique
    Wangde, Fawaz, I
    Mulay, Shivam P.
    Adhao, Rahul B.
    Pachghare, Vinod K.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 551 - 557
  • [7] Towards Detection of Zero-Day Botnet Attack in IoT Networks using Federated Learning
    Zhang, Jielun
    Liang, Shicong
    Ye, Feng
    Hu, Rose Qingyang
    Qian, Yi
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 7 - 12
  • [8] Social Media Zero-Day Attack Detection Using TensorFlow
    Topcu, Ahmet Ercan
    Alzoubi, Yehia Ibrahim
    Elbasi, Ersin
    Camalan, Emre
    ELECTRONICS, 2023, 12 (17)
  • [9] Zero-Day Attack Detection and Prevention in Software-Defined Networks
    Al-Rushdan, Huthifh
    Shurman, Mohammad
    Alnabelsi, Sharhabeel H.
    Althebyan, Qutaibah
    2019 INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2019, : 278 - 282
  • [10] Zero-Day Attack Packet Highlighting System
    Jeong, Jang Hyeon
    Kim, Jong Beom
    Choi, Seong Gon
    2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 200 - 204