Font Size: a A A

Constructing Attack Scenario For Multi-IDS Systems

Posted on:2008-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:S S HuangFull Text:PDF
GTID:2178360272469539Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Nowadays, one very complicated problem bothering network analysts too much is the redundant data generated by IDS. The objective of our system SATA (Security Alert & Threat Analysis) is trying to solve this problem. Several novel methods using data mining technologies to reconstruct attack scenarios were proposed to predict the next stage of attacks according to the recognition the attackers'high level strategies. The main idea of this paper is to propose a novel idea of mining"complicated"attack scenarios based on multi-agent systems without the limitation of necessity of clear attack specifications and precise rule definitions. We propose SAMP, a reformative prefreespan algorithm, to mine frequent attack behavior sequences and construct attack scenarios. We also propose CAST which can construct the attack scenario tree for finding relationship between new attacks and historical attack scenarios effectively. The definition of cor-correlativity and pre-correlativity among three elements in frequent attack sequences are described for the attack behaviors correlation and potential attack intention identification. We perform a series of experiments to validate our method on practical attack network environments of CERNET. The results of experiments show that our approach is valid in multi-agent attack scenario construction and correlation analysis.
Keywords/Search Tags:frequent attack sequence, attack scenario reconstruction, intrusion detection, data mining, correlation analysis
PDF Full Text Request
Related items