Proceedings of the 12th International Conference on Availability, Reliability and Security 2017
DOI: 10.1145/3098954.3098981
|View full text |Cite
|
Sign up to set email alerts
|

On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts

Abstract: Data mining is well-known for its ability to extract concealed and indistinct patterns in the data, which is a common task in the field of cyber security. However, data mining is not always used to its full potential among cyber security community. In this paper, we discuss usability of sequential pattern and rule mining, a subset of data mining methods, in an analysis of cyber security alerts. First, we survey the use case of data mining, namely alert correlation and attack prediction. Subsequently, we evalua… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(23 citation statements)
references
References 37 publications
0
23
0
Order By: Relevance
“…Similar port combinations in Top-10 rules can be seen in rules 5 and 8. In general, we can see common combinations of port numbers that are often scanned together [23]. Another example of attack progression can be seen in rule 2, where we can see two distinct attack steps, scanning and brute-forcing.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Similar port combinations in Top-10 rules can be seen in rules 5 and 8. In general, we can see common combinations of port numbers that are often scanned together [23]. Another example of attack progression can be seen in rule 2, where we can see two distinct attack steps, scanning and brute-forcing.…”
Section: Resultsmentioning
confidence: 99%
“…However, a generic approach similar to early attempts to attack prediction is still an open research problem [3]. Further, many of the proposed attack prediction methods have only been evaluated using the datasets, but we know little about running such methods on data from real networks [23]. In a related domain of threat intelligence, Fachkha et al [24] used data mining on darknet data to predict cyber threats in the global scope.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Perceiving the security situation via intrusion detection systems (IDS) and comprehending cyber attacks via alert correlation allows for the projection of ongoing attacks and prediction of upcoming security events. This article builds foundations from our previous work, in which we tackled various related topics, such as method selection [20], long-term observations [18], and system design [19]. Herein, we present further explorations within such fields and shed light on lessons learned towards the utmost goal of achieving attack projections and building predictive blacklisting capabilities.…”
Section: Introductionmentioning
confidence: 96%