2017
DOI: 10.5753/isys.2017.331
|View full text |Cite
|
Sign up to set email alerts
|

Discovering Attackers Past Behavior to Generate Online Hyper-Alerts

Abstract: To support information security, organizations deploy Intrusion Detection Systems (IDS) that monitor information systems and networks, generating alerts for every suspicious behavior. However, the huge amount of alerts that an IDS triggers and their low-level representation make the alerts analysis a challenging task. In this paper, we propose a new approach based on hierarchical clustering that supports intrusion alert analysis in two main steps. First, it correlates historical alerts to identify the most com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…The algorithm aggregates alerts into a graph structure according to internet provider (IP) address and attack mode and applies the Bit-AssocRule algorithm to mine frequent patterns in the model graph. Ramaki et al [ 26 ] proposed a real-time alert correlation framework based on stream mining to detect multi-step attack scenarios. First, the framework aggregate alerts into hyper-alerts and sorts them by their time tags.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithm aggregates alerts into a graph structure according to internet provider (IP) address and attack mode and applies the Bit-AssocRule algorithm to mine frequent patterns in the model graph. Ramaki et al [ 26 ] proposed a real-time alert correlation framework based on stream mining to detect multi-step attack scenarios. First, the framework aggregate alerts into hyper-alerts and sorts them by their time tags.…”
Section: Related Workmentioning
confidence: 99%
“…Manual analysis of cyber-attacks by network security administrators is an important means to ensure network system security in practice [ 26 ]. However, attack graphs generated by state-of-the-art algorithms are extremely complex for network security administrators to understand.…”
Section: Attack Modelingmentioning
confidence: 99%
“…10 Example of graph signature in the EDL language [61] and correlation, known as the NAC process [68]. This process may be complemented by a clustering step [69,70] to enrich detection capacity.…”
Section: Second Ids Generation: Alert Correlationmentioning
confidence: 99%
“…Knowledge-based approaches include Frequent Subgraph Mining (FSM), description languages and expert systems. Machine-learning-based approaches in this classification include Bayesian networks and outlier detection, which are advanced statistical techniques, as well as Markov models [78], neural networks [79], fuzzy logic, genetic algorithms [80], ant-colony-based solutions [81] and clustering [69].…”
Section: Third Ids Generation: Data Miningmentioning
confidence: 99%