2016
DOI: 10.1007/bf03391586
|View full text |Cite
|
Sign up to set email alerts
|

A multi-step attack-correlation method with privacy protection

Abstract: Abstract:In the era of global Internet security threats, there is an urgent need for different organizations to cooperate and jointly fight against cyber attacks. We present an algorithm that combines a privacy-preserving technique and a multi-step attack-correlation method to better balance the privacy and availability of alarm data. This algorithm is used to construct multistep attack scenarios by discovering sequential attack-behavior patterns. It analyzes the time-sequential characteristics of attack behav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…In the constructed }, we consider two popular temporal correlations between links (as shown in Fig. 4), i.e., multiple steps and multiple hops [31][32][33]. We only explain the correlations between two links here for simplification although they can actually happen among more links.…”
Section: Structure-enhanced Abnormality Evaluationmentioning
confidence: 99%
“…In the constructed }, we consider two popular temporal correlations between links (as shown in Fig. 4), i.e., multiple steps and multiple hops [31][32][33]. We only explain the correlations between two links here for simplification although they can actually happen among more links.…”
Section: Structure-enhanced Abnormality Evaluationmentioning
confidence: 99%
“…In this case, the repeated comparisons between alerts will lead to a huge computational overload especially in large scale networks. Supervised learning algorithms were applied by many au-thors such as [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] and [42]. Qin and Lee [43] proposed an integrated correlation system to identify novel attack strategies using INFOSEC alerts.…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…As shown in Fig. 3, abnormal flows happen in a sequence, i.e., multi-step and multi-hop flow sequences, where the previous detected abnormal flows will increase the abnormal possibility of the upcoming flows [41]. For example, in Fig.…”
Section: B Modeling Structural Correlationsmentioning
confidence: 99%