2013
DOI: 10.1007/978-3-642-40173-2_38
|View full text |Cite
|
Sign up to set email alerts
|

Discovering Multi-stage Attacks Using Closed Multi-dimensional Sequential Pattern Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Multi-stage attack patterns can be discovered by analyzing sequence data. The approach by Brahmi and Yahia [135] is based on a closed multi-dimensional sequential pattern mining algorithm, called Closed Multi-Dimensional PrefixSpan (CMD PrefixSpan), which is an improved version of the PrefixSpan [136]. The search for frequently encountered alert sequences is performed using a multi-dimensional table with alert attributes.…”
Section: ) Statistical-based Methodsmentioning
confidence: 99%
“…Multi-stage attack patterns can be discovered by analyzing sequence data. The approach by Brahmi and Yahia [135] is based on a closed multi-dimensional sequential pattern mining algorithm, called Closed Multi-Dimensional PrefixSpan (CMD PrefixSpan), which is an improved version of the PrefixSpan [136]. The search for frequently encountered alert sequences is performed using a multi-dimensional table with alert attributes.…”
Section: ) Statistical-based Methodsmentioning
confidence: 99%
“…Pattern extraction is conducted based on association rule, sequential mining, or frequent episode mining. An improved version of the Prefix Span algorithm is applied by Brahmi and Yah [19] as a method of finding the most frequent patterns by distributing the alerts and their attributes in multi-dimensional tables. Sequential-based methods are useful for modeling and analyzing complex attack scenarios from sequences of individual events or steps that are a part of the same attack scenario.…”
Section: Alert Aggregation and Alert Correlationmentioning
confidence: 99%
“…Classes of sequential patterns and measures of interest for the field of ICT risk assessment are then introduced in Sect. 4. Next, in Sect.…”
Section: Introductionmentioning
confidence: 95%
“…Finally, the usage of data mining models in IDS has been widely adopted, e.g., using classifiers [11], association rules [9], and closed sequential patterns [4]. All of them struggle with the lack of enough data for building accurate models.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation