Automatic multi-step attack pattern discovering

Size: px
Start display at page:

Download "Automatic multi-step attack pattern discovering"

Transcription

1 nternational Journal of Network Security Vol.xx No.xx PP.xxx xxx xxx Automatic multi-step attack pattern discovering Li Wang Ali Ghorbani Yao Li Faculty of Computer Science University of New Brunswick Fredericton New Brunswick Canada ( Abstract Current techniques employed in security alert correlation area for multi-step attack recognition purpose are intricate to be performed due to the complexity of the methods and huge computing workload generated during alert analysis and processing. n this paper we proposed a new method of alert correlation aiming at providing concentrated security event information and thus finding multi-step attack patterns accordingly. We use a kind of extension time window when aggregate the alerts into high level alerts. We then connect hyper alerts into candidate multistep attack patterns according to their P address association. The final real multi-step attack patterns are discovered from these connected attack patterns with quantitative correlation calculation method. The method is easy to implement and practical to deploy which is proved by the result of our experiments. The experiment also shows our approach can effectively find real multi-step attack behavior patterns and can be used to identify true attack threats. Key words: Extension time window alert correlation multi-step attack pattern correlativity ntroduction The information security industry has been very active in recent years. n order to counterwork security threats to computer systems and networks many technologies have been developed and applied in security operations such as DS firewalls routers. All those security application devices whether aimed at prevention or detection of attacks usually generate huge volumes of security audit data. Deploying information security systems can provide in-depth protection for networks. However large volume of security data which is the output of different security sensors can overwhelm security managers and keep them from performing effective analysis and initiating timely response. Therefore it is important to develop an advanced alert correlation system that can reduce alert redundancy intelligently correlate security alerts and detect attack strategies. Correlating security alerts and discovering attack strategies are important components of such systems.. Related works Up to now there have been several proposed techniques of analyzing attack scenarios from security alerts. However most of these approaches depend on complex correlation rule definition and hard-coded domain knowledge that lead to their difficult implementation and limited capabilities of detecting new attack strategies. n [2-4] Cuppens et al. correlates alerts if the prerequisites of some later alerts are satisfied by the consequences of some earlier alerts in MRADOR correlation method. The attack base was specified in LAMBDA and was analyzed to generate correlation rules to be used to construct attack scenarios. Ning et al. [5-7] use similar method with theirs. They construct attack scenarios through alert correlation using prerequisites and consequences of attacks in

2 Automatic multi-step attack pattern discovering TAA correlation method. Both approaches are based on the observation that in a series of attacks the attacks were usually not isolated but related as different stages with the earlier stages preparing for the later ones. Such methods can potentially uncover the causal relationship between alerts but they need to define the specification of attacks and the attack plan recognition results rely on the precision of the correlation rules. Such limitations make the methods difficult and complex to implement. BM researchers also have made some efforts on the techniques of alert aggregation and alert verification. Araujo et al. [8] presents a method of mining correlation rules from hand-labeled training examples by using rule wizard and rule editor. t is integrated in the BM Tivoli Event Console (TEC). t enables automatic creation of rules which helps operators by providing a simple way to create rules based on observed events but it relies on the expertise knowledge and manual configuration. Julisch et al. [9-0] introduce the concept of root cause and propose an alarm clustering method to support the discovery of root cause which can help remove most of the redundant alarms that can be attributed to a small number of root causes. This method also need expertise knowledge and can not solve the problem of false negative. Valdes et al. [] proposed a probabilisticbased approach to correlate and aggregate security alerts by measuring and evaluating the similarities of alert attributes. They use a similarity metric to fuse alerts into meta-alerts to provide a higher-level view of the security state of the system. Alert aggregation and scenario construction are conducted by enhancing or relaxing the similarity requirements in some attribute fields. But similarity calculation is the only way for them to aggregate the alerts. They have to compare all the alert pairs and have to determine a lot of thresholds with expert knowledge which lead to their huge volume of computing workload. Sheyner and J. W. Wing et al. [2] proposed a model checking based technique to automatically construct attack graphs. Although it helps facilitate the task of defining attack graphs it has the limitation of scalability especially for larger network and systems. n [3-4] Wenke lee and Xinzhou Qin proposed a GCT-based and Bayesian-based correlation approach to identifying new alert relationship without depending on prior knowledge of attack transition patterns. The method originates from the idea that attack steps are directly related because an earlier attack enables or positively affects the later one. But the method can only detect scenario segment by mining related alert pairs and the analysis of alert pairs results in huge computing workload which also leads to the limitation of the final multi-step discovering result. All the existing methods in security alert correlation area have their limitations. They either depend on complex correlation rule definition or depend on hard-coded domain knowledge. Most approaches are lack of flexibilities and adaptability. These drawbacks lead to their difficult implementation and limited capabilities of detecting new attack strategies. n addition most of them are off-line processing. To solve the problems of complex rule definition and fragmentized attack scenario construction we proposed a new method of attack scenario construction []. Our multi-step attack correlation method has two components. We first mine multi-step attack activity patterns with attack sequential pattern mining method from history aggregated high level alerts which we call security event data. We then match the events online to identify the events which accord with certain attack sequential pattern and correlate them using a quantitative method. Therefore attack plans of the attackers can be recognized and the next step the attacker will take can be predicted accordingly. While this method requires good integration of history 2

3 nternational Journal of Network Security Vol.xx No.xx PP.xxx xxx xxx database which should include various multi-step attack instances. This paper focuses on discovering multi-step attack strategies via the analysis of security alerts based on a new alert correlation method. We first aggregate all the alerts into three types of hyperalerts and then connect these hyper-alerts according to their P address attribute associations. With the connected hyper-alert links which are the candidates of multi-step attack patterns we analyze the relationship between contextual nodes of each link to find out all the meaningful multi-step attack patterns..2 Organization of the paper We discover multi-step attack patterns in four phases: i) Aggregation Phase ii) Candidate Attack Link Generation Phase iii) Pattern Correlation Phase iv) Real Attack Discovery Phase. Section 2 introduces the overview of our work. Section 3 gives this problem decomposition. Section4 proposes the algorithm of the problem. Section 5 reports our experiments with the 2000 DARPA intrusion detection scenario specific datasets and live data collected from our test bed. We conclude with a summary and directions for future work in section 6. 2 About Our Work 2. Overview of our work Fig. System architecture. Figure shows an overview of our system architecture. There are four main modules in our system including: alert normalization alert aggregation hyper alert connection multi-step pattern discovery. All the security reports of these four procedures are output through our web user interfaces. Data collection and alert normalization module can be functionally divided into two parts: the agent sub-module which is installed on the sensor-side reading and normalizing reports from log files generated from different security application devices continuously and sending them to the server and the server sub-module which manages all the agents receives the security data and stores them in alert database. Alert aggregation function merges the alerts according to their P address similarities and time attribute associations into three types of hyper alerts. Alert aggregation module thus combines repetitious and redundant alerts in order to provide more synthetic information to security manager and to the following module. After that the hyper alert connection function find out those related hyper alerts with associated destination and source P addresses or same source P addresses and connect them to form candidate multi-step attack patterns (pseudo attack links). The final multi-step pattern discovery module takes the result of hyper alert connection function and further analyzes the correlativity between contextual node pair in these pseudo attack links to find out meaningful multi-step attack patterns. With the attack patterns we can create rules for detecting multi-step attacks and thus recognize the attack plans of the attackers or even predict the next step the attacker will take. 2.2 Terminology We define some time windows used for alert aggregation processing and alert connection processing. They determine the associate time window when processing raw alerts or hyper alerts. We also define three different types of hyper alerts in this section which represent three different kinds of hyper alerts having different synthetical features according to their P address associations besides attack type and timestamp features.

4 Automatic multi-step attack pattern discovering 2.. Time Window Definition Event time window defines the time interval within which all the alerts aroused by same security event are interspersing. Event time window can be considered as the maximum delay for two alerts aroused by same security event. So when aggregate the alerts together those which fall into the same event time window can be considered to aggregate into a hyper alert. Definition. Security Event time window W. Consider that SE a and a are the first and last k alerts received which are aroused by the same security event SE a i ( < i < k) is any alert between a and a which is also aroused by k SE then we get a. attack _ type = a2. attack _ type =... = ak. attack _ type. For SE and a ai ak SE we define event time window W SE satisfies the following inequation: Min( ai. timestamp a. timestamp) WSE. Max( ak. timestamp a. timestamp) We use inter-event time window term to describe the time interval that between two successively happened security events. This is useful to determine the size and location of event time window when doing alert aggregation. Since different delays exist in event detection and reporting by DS the event time window is flexible in different situations we use event time window appended with inter-event time window to help us group similar alerts together. Definition 2. nter-event time window W. E Suppose SE and SE are two security events 2 associated to two contextual event time window < a... a... a... a > ( i < j ) and i j n n < b... bk... bl... bm> ( k < l m) are the alert sequences corresponding to the two security events respectively. a. stamptime < b. stamptime in this situation SE is considered as occurring earlier than SE. We define 2 W E _ as: Min{( ai a j )( bk bl )} WE _ Max{( ai a j )( bk bl )}. Definition 3 Attack Scenario time window W. Consider that AS h and h are the hyper k alerts generated after aggregation phase and they correspond to the first attack step and the last attack step taken by the attacker in a possible attack scenario AS respectively. h i ( < i < k) is any hyper alert between h and h in AS that is k AS =< h... hi... hk > ( < i < k). Then we define W AS = AS. end _ time AS. begin_ time and for AS and h h 2 hk AS it satisfies following Min( hi. timestamp h. timestamp) WAS inequation:. Max( h. timestamp h. timestamp) k 2..2 Hyper Alert Definition For all the alerts fall into the same security event time window can be merged into hyper alerts according to the similarity of their attack type and P address attribute features. We defined three types of hyper alerts and defined them as follows: Definition 3. Type hyper alert. Suppose the alert sequence A =< a... ai... an > ( i n) locates in a W SE that means an. stamptime a. stamptime SizeofW SE if a. srcp = a2. srcp =... = an. srcp asrcp. ( ) i SP i n a. dstp = a2. dstp =... = an. dstp adstp. ( ) i DP i n and a. attack _ type = a2. attack _ type = at is the attack... = an. attack_ type= at type name defined by the system or simply integer signature D which corresponds to particular attack type. Then we can aggregate the alert set A into a type hyper alert represented as: at( SP DP AD T N ) in which refers to type hyper alert AD = { ai. alert _ D ai A a i n} T = a. timestamp N = AD. According to the definition type hyper alerts have the feature of having same source and 4

5 nternational Journal of Network Security Vol.xx No.xx PP.xxx xxx xxx destination P addresses as well as same attack type. Definition 4. Type hyper alert. For alert sequence B =< b... bi... bn > ( i n) received in a security event time window W if SE b. srcp = b. 2 srcp =... = bn. srcp = SP b. dstp... bi. dstp... bn. dstp and b. attack _ type = b2. attack _ type = at refers to some... = bn. attack _ type = at attack type. Then we can aggregate the alert set B = { b... bi... bn}( i n) into a type hyper alert represented as: at( SP DP AD T N ) in which refers to type hyper alert DP = { bi. dstp bi B i n} AD = { bi. alert _ D bi B i n} T = b. timestamp N = AD. According to the definition type hyper alerts composed of all the alerts in the same security event time window which have same source P address different destination P addresses and same attack type. Definition 5. Type hyper alert. For alert sequence C =< c... ci... cn > ( i n) received in a W if SE c. srcp c2. srcp... c. srcp c. srcp SP c. dstp =... ci. dstp =... cn. dstp = DP and b. attack _ type = b2. attack _ type =. Then we can... = bn. attack _ type = at aggregate the alert set C = { c... ci... cn}( i n) into a type hyper alert represented as: at ( SP DP AD T ) in which refers to type hyper alert SP is the P address set contains all the source P addresses of set C DP is the set with single value of destination P address of all the members in set C n i AD = { ci. alert _ D ci C i n} T is the timestamp attribute of hyper alert at( SP DP AD T N ) T = c. timestamp N = AD. According to the definition 3 type hyper alerts are composed of all the alerts in the same security event time window which have same destination P address and different source P addresses and same attack type. 3 Problem Decomposition After alert normalization phase we get standard alert database. Each alert in the database consists of the following fields: alert-id (id-number sensor-id) signature-id (attack type) timestamp source (source-p source-port) destination (destination-p destination-port) risk (reliability asset and priority) and protocol. 3. Alert aggregation Alert aggregation then merges the alerts into three types of high level alerts. Those who have same attack type and occur in a certain time interval are combined into a hyper alert according to the similarity of P address attributes. 3.. Extension time window technique When aggregating the alerts we use an extension time window technique to decide the size and the location of each event time window. The quantities of the alerts triggered by different security events are different varying from one to thousands. f we use event time window with fixed size to aggregate the alerts the settling of the window size is difficult. f it is set too large alerts aroused by different security events may be merged into one hyper alert. f it is set small the alerts belonging to same security event may be split into at least two parts. Both situations will result in inaccurate alert aggregation. Therefore we use a kind of extension time window for setting event time window when aggregate the alerts. Figure 2 gives the illustration of the idea of this extension time window technique. We apply a base event time window which has the basic size of all event time windows. That means the event time windows can be extended based on the base

6 Automatic multi-step attack pattern discovering event time window according to the particular situations. Fig. 2 llustration for alert aggregation processing. n figure 2 from left to right are the hyper alerts received one after the other. Hyper alert h to hyper alert h fall into the first base event time k window W. Then we examine the time SE _ interval between the last alert h k in W and the SE _ first alert h following the window if it is less k+ than or equal to the inter event time window size ε defined in advance we think alert h k and h k+ have close time association the event time window W expands to contain alert SE _ h. f the k+ time interval between h k+ and h is still less k+ 2 than ε repeat the same operation until the time interval between the last alert in current time window and the next following alert is larger than ε or until the times of window expanding operation exceed a certain predefined threshold number for example 500 times then the window stops extension and the next event window is supposed to begin. Compared with general sliding associated time window the extension time window is more flexible which can operate in different situations. t is also more efficient than the way of simply moving the window one by one alert thus it avoids the complexity of solving the overlap parts and also solves the efficiency problem caused by too many timers generated during window sliding. Figure 3 shows the algorithm of extension event time window used in generating event time windows during alert aggregation processing. From the algorithm we can see there are two criteria for event time window to be expanded. One is the time interval between the last alert in current event window and the first following alert exceeds the size of inter-event window. The other criteria is the extension for the number of extra alerts to be contained in one event window is no more than a certain predefined figure which means the window will not extend unlimitedly in busy network flow situation after collecting enough number of alerts the window will stop extension in case the event window expanding to an unreasonable size. input W =ε ex_alert_no=δ ; E W _ =α alert sequence from id 0 to id last_alert_id ( sorted by timestamp) begin i=0; j=0; n=0; while (j last_alert_id) do { if (alert(j).timestamp-alert(i).timestamp α ) j++; else if (alert(j).timestamp-alert(i).timestamp ε && n δ ) {j++; n++;} else { AggregatenEw(i j); j++; i=j; n=0; } } end while end SE base Fig. 3 Algorithm of extension event time window Alert aggregation method Figure 4 gives the algorithm of alert aggregation in one generated event time window. n alert aggregation processing we consider aggregate the alerts fall into an event time window into hyper alerts. We study the association between the alert attributes of attack type source P address and destination P address in a same event time window and aggregate the alerts into 3 types of hyper alerts as defined in section 2. After alert aggregation we keep the information of hyper alert type source P address set destination P address set alert D set timestamp number of raw alerts and window 6

7 nternational Journal of Network Security Vol.xx No.xx PP.xxx xxx xxx D. This information facilitates the following hyper alert connection and correlation processing. We can also study the similarity or other features between the alert sets hyper alert type or attack type frequency or the regularity of the timestamp for each similar pattern group to figure out if there exists any pattern which is caused by some system configuration error or some failure operations. input EW(i j) // alert sequence in a Event Time Window (start from alert id i and end with alert id j k is the current hyper alert id) begin H = H H H = ; //h_yper alert set for current EW k=i; while (i j) do { if ((alert(i).attacktype is new ) ((alert(i).srcp and alert(i).dstp are new) && alert(i).attacktype H )) { k++; create h_alert(k) in H ; add i to h_alert(k).ad; h_alert(k).n++; i++; } else if ((alert(i).srcp and alert(i).dstp are new) && alert(i).attacktype H ) { take h_alert(d) with attacktype alert(i).attacktype in H ; //d is h_alert id add i to h_alert(d).ad; h_alert(d).n++; i++; } else if (alert(i).srcp is new && alert(i).attacktype H H ) { take h_alert_id with same dstp in H H ; d= h_alert_id; remove alert(i).dstp from h_alert(d).dp; if h_alert(d).dp = { move h_alert(d) to H ; add i to h_alert(k).ad; h_alert(k).n++; i++; } else{ remove alert(l) with same dstp from H H ; k++; create h_alert(k); add alert(l) to h_alert(k) add alert(i) to h_alert(k); add h_alert(k) to H ; i++; } } //end of if (alert(i).srcp is new && if (alert(i).srcp is new && alert(i).attacktype H { take h_alert_id with same dstp in H ; d= h_alert_id; add alert(i) to h_alert(k); i++; } else if (alert(i).attacktype H H ) { take h_alert_id with same srcp in H H ; d= h_alert_id; remove alert(i).srcp from h_alert(d).sp; if h_alert(d).sp = { move h_alert(d) to H ; add i to h_alert(k).ad; h_alert(k).n++; i++; } else{ remove alert(l) with same srcp from H H ; k++; create h_alert(k); add alert(l) to h_alert(k) add alert(i) to h_alert(k); add h_alert(k) to H ; i++; } } //end of if (alert(i). attacktype H H else { take h_alert_id with same srcp in H ; d= h_alert_id; add alert(i) to h_alert(k); i++; } // end of if ((alert(i).attacktype is new ) } end while end output H. Fig. 3 Algorithm of alert aggregation. 3.2 Multi-step attack pattern recognition 3.2. Candidate attack link After alert aggregation we merged low level alerts into three types of hyper alerts. A ( SP DP { 2} T 2 W ) is an examples of hyper alert after aggregation processing. A refers to attack type. means hyper alert type. SP and DP are source P address set and destination P address set respectively. t also contains raw alert D set timestamp number of corresponding raw alerts and event time window D. We sort all the hyper alerts according to their timestamp attribute and connect them according to their P address associations. The condition of connecting two hyper alerts together to form candidate attack link is that h and h 2 can be connected is they satisfy: ( h. SP h 2. SP or h. DP h2. SP ) and h2. timestamp h. timestamp W. AS

8 Automatic multi-step attack pattern discovering For contextual attack steps involved in the same multi-step attack their source P always have associations or the destination P of the previous step and the source P of the next step usually have similarities or associations. So if two hyper alerts meet such condition we consider connect them to form candidate attack links. The final real multi-step patterns can be further detected from these candidate attack links. The foundation of doing so bases on the observations that in multi-step attack aroused by certain attacker the source P and destination P address always have some association or are the same. For example the attacker first scan the target network then select a target host from the result of the first step to exploit it. The source P address should be the same. n another case the attacker installed a daemon program on the victim host then victim host attack the target. The destination P address of the former step contains the source P of the latter step Filtering phase n this phase we filter out segment attack links from the result of hyper alert connection processing. We fist remove all the short links which are contained by other longer links to remove attack scenario segment. We also study the similar links with periodical features to remove them. Because periodically happened attack links are caused by some system configuration error or some normal network activities they are not the real attack we are looking for. After filtering we get pseudo-attack-link in the form of connected hyper alert links. We correlate the contextual nodes in pseudo-attacklink to determine whether they have real correlationship or just happen to be connected together Correlation phase For the same intension of attack steps in an attack scenario there is relationship existing between two attack steps except their time association. For example the attacker takes an PSweep action first and then inquires about the vulnerability. The source P or other attributes of the two steps maybe similar or may have relationship more or less. The alert association describes the correlation-ship of the two alerts. The larger the alert correlativity is the more possible they belong to the same scenarios. The alert correlativity measures the relationship between two hyper alerts. The correlativity between hyper alerts h i and h is j determined by the formula: p HC( h h ) w HAC( x y )/ w = i j ij i j ij i j= i j= h and i h are described by p attributes x j x 2 x p and y y 2 y p respectively. The correlativity between h i and h is described j as the weighted sum of their attribute correlativity HAC( xi y j). Currently we only consider four attributes of hyper alert which contribute the value of HC( hi h j) they are source P address destination P address source port number destination port number. Table gives the weight matrix. For the sake of standard normalization computation the sum of all weights in the table is. n addition since h is earlier than i h the matrix is not symmetrical. j The weight values are set empirically and can be tuned in practice. Small deviation of weight setting will not affect the accuracy of final correlation result since we only calculate the correlativity between two alerts which accord with certain pattern already. They either have strong relationship or not depending on they either belong to the same attack scenario or not. Table : W ij weigh matrix i\j SrcP DstP SrcPort DstPort SrcP DstP SrcPort DstPort p 8

9 nternational Journal of Network Security Vol.xx No.xx PP.xxx xxx xxx Hyper alert is composed of more than one raw alert. Therefore attribute values of every alert are sets with various data type elements. For example an P address type attribute of a hyper alert is an P address set instead of a single P address. t can be represented as: {P P 2 P n- P n } (n>=). Since the hyper alert attribute values are set values instead of single value types. We need to determine the calculation of correlativity between set values. For the problem of computing the distance between two sets we need to classify the set first and then do the computation. The existing classification algorithms are complicated and are not suitable for online processing especially for this particular question. We use our CTG (correlation tree graph) method here to define the alert attribute value classification and correlativity. According to alert correlativity definition we should determine the following alert attribute correlativity functions shown in table 2. We need to determine the method of evaluating the correlation-ship between P address sets port number sets. Table 2: Alert attribute correlativity involved in alert correlativity definition Alert Attribute Correlativity HAC(SrcP i SrcP j ) HAC(SrcPort i SrcPort j ) HAC(DstPort i DstPort j ) HAC(DstP i SrcP j ) HAC(DstP i DstP j ) HAC(SrcP i DstP j ) Function type between P address sets between port number sets between port number sets between P address sets between P address sets between P address sets Before determine the correlativity between two sets we should first classify the set value to a designated class. The classification threshold is 80%. P address data type parameter is very important reference of measuring the level of final alert correlativity. Figure 5 shows the CTG for P address type alert attribute value. The classification and correlativity of P address sets are defined by a correlation tree graph structure. We use this CTG definition to get the value of alert attribute correlativity especially with P address data type. First we use the CTG in figure 5 to classify the P address type alert attribute value. Situation : Suppose we need to determine the value of HAC(S S 2 ) which is the correlativity between two sets S and S 2 with P address data type S ={ } and S 2 ={ }. We first determine each set belongs to which node of the CTG in figure. The classification threshold is 80%. t is not hard to figure out that S and S 2 all belongs to node since more than 80% elements of both sets belong to this node. According to the definition given in figure 5 we get the correlativity between S and S 2 is that is HAC(S S 2 ) = which means there is maximum correlation-ship existing between S and S server 0.3 nside Station All P A Class 0 Outside 0.2 B Class P in P in P in P in P in A B C D Other Fig. 5 CTG for P address type attribute correlativity definition Situation 2: To determine the value of HAC(S 3 S 4 ). S 3 = { } belonging to server node in CTG and S 4 = { } belonging to station class by searching the CTG in figure 5 we get the result: HAC(S 3 S 4 ) = 0.3. Situation 3: Consider the correlativity between S 3 and S 5 (S 3 belongs to server class and S 5 belongs to outside class) then the result according to the definition in figure is 0. 0 is C Class 0.2 D Class Other 0.6

10 Automatic multi-step attack pattern discovering the minimum of correlativity which means the two sets representing two alert P address attribute values have no relationship. That is they have the least possibility of belonging to the same attack scenario. Correlativity between Port address data type sets is another important factor for the degree of alert correlativity. Figure 6 shows the CTG for Port address type alert attribute correlativity. Each node of CTG represent different class of Port address set and the figure besides the node represents the correlativity between two child nodes of this node. For each port address type alert attribute value it can be represented as: {p p 2 p n- p n } (n>=). The classification threshold is 80% if more than 80% elements of the set belong to one node then the set is classified to the class represented by the node. For example: Privileg ed All Ports NonePr eviliged Fig. 6 CTG for Port address type attribute correlativity definition Situation : Given HAC(P P 2 ) P = {80} P 2 = { }. Both P and P 2 belong to the class 80 the node with port number 80. From figure 6 we get the correlativity of the two sets is that is HAC(P P 2 ) =. Situation 2: Given HAC(P 3 P 4 ) P 3 belongs to node 2 P 4 belongs to node Privileged their parent node is Privileged. Therefore according to the port address CTG definition in figure 6 HAC(P 3 P 4 )=0.5. Situation 3: Given HAC(P 3 P 5 ) P 3 is classified to node 2 and P 5 belongs to the class None Privileged. By querying the CTG in figure 6 we get the correlativity of the two sets is 0 that means P 3 and P 5 have no relationship with each other. They have the minimum possibility of contributing to the degree of alert correlativity Recognition phase We calculate the correlativity of each contextual pair nodes in each pseudo attack link. Remove those attack links with low correlativities. We also split a link into two parts if a low correlativity result is found between two nodes to remove any meaningless segment attached to a real attack link. After this recognition phase all the attack links which have real relationship between all their contextual pair nodes are kept. The links with low correlativities are considered having no real associations between neighbor nodes and are dropped after processing. 4 Experiment To evaluate the effectiveness of our method we applied our algorithm to DARPA 2000 benchmark repository scenario-specific datasets [5] and live data collected from our honey-net test platform. DARPA 2000 datasets consist of two intrusion scenarios LLDDOS.0 and LLDDOS2.0.2 [MT Lincoln Lab 2000]. LLDOS.0 contains a series of attacks in which an attacker probes breaks in installs the components necessary to launch a DDoS attack and actually launches a DDoS attack against an off-site server. We use playback technique (Open source tool Tcpreplay32 [6]) to induct the workflow to the DS sensors integrated in the system. We then use the alerts reported by RealSecure and Snort as the input of our approach. Table 3 shows the aggregation and correlation result of our method with Event time window and Attack scenario time window setting to 5 minutes and 60 minutes respectively. Aggregation rate is defined as: # of _ raw _ alerts # of _ hyper _ alerts. C_AL means the # of _ raw _ alerts number of candidate multi-step attack links after 0

11 nternational Journal of Network Security Vol.xx No.xx PP.xxx xxx xxx hyper alert connection process. P_AL means the number of pseudo-attack-links after subset filtering process. F_AL means the number of final meaningful attack patterns discovered from pseudo-attack-links with hyper alert correlativity verification process. Drop rate is defined as: # of _ P _ AL # of _ F _ AL. We set correlativity # of _ P _ AL threshold as 0.4. The attack links which contain correlativities lower than 0.4 are dropped from the final attack patterns. n our DARPA test all the dropped attack links are meaningless multistep attack patterns. They happened to be connected together when using P address associations to connect them. Correlativity calculation can reduce this part of attack links and keep those meaningful attack patterns which correspond to real multi-step attacks. Figure 7 shows some examples of dropped patterns after correlativity checking. They are dropped for their low correlativities between contextual nodes in connected attack links. From the example of figure 7 (b) we can see that althought the involved contextual attack types are the same the correlativity is not always high. This demonstrates that correlativity is a good way to evaluate the relationship between contextual two steps in a multi-stage attack other than the similarity of two alerts. Fig. 7 Examples of dropped attack links after correlativity checking Figure 8 shows the real attack patterns we got from the final correlation result. The correlativities of neighboring node pairs reflect strong relationship residing in contextual steps of a real multi-step attack specifically Sadmind DDoS attack in this experiment. Table 3: Test result with DARPA 2000 LLDOS.0 dataset Raw alert # H # H # H # Aggregation Rate C_AL P_AL F_AL Drop Rate 937 (Snort) % % 922 (RS) % % Fig. 8 Examples of final attack patterns in DARPA test

12 nternational Journal of Network Security Vol.xx No.xx PP.xxx xxx xxx Figure 8 (a) shows the attack patterns we found from snort alerts. Figure 8 (b) to 8 (d) are the examples of attack patterns we found from RealSecure alerts. We can see that in figure 8 (b) and figure 8 (c) there exists repeated attack types in a particular attack link. This is due to the particularity of hyper alert generating and connection mechanisms and can be easily combined into one step to reduce the redundancy of the attack pattern. That is also the reason why there is only one main multi-step attack scenario in DARPA test but we got more than one attack patterns. After manually checking the result patterns they are all meaningful and can be related back to the original alert distribution condition. We also used real data to test our method. Figure 9 shows a real Trinoo multi-step attack pattern built by our correlation method. We can thus build corresponding correlation rules according to these patterns to realize the goal of real-time multi-step attack detection. Fig. 9 A real Trinoo DDoS attack pattern 5 Conclusion n this paper we proposed a new multi-step attack pattern discovering method which aims at solving the problems of new attack pattern discovering and difficulty in complex attack association rule definition and maintenance. We classified the raw alerts into three types of hyper alerts and connected the hyper alerts to form candidate attack links according to their P address attribute associations. We then apply hyper alert correlativity calculation method to candidate attack links to filter out the attack links which have no real relationship. Experiment shows our method can find real multi-step attack patterns from network security alert data successfully. The hyper alert generation method can provide a concentrated perspective of network security event information and provide favorable prerequisites for further multi-step attack pattern discovering processing. The correlation method can effectively differentiate real attacks and fake attack links. The final attack patterns we got can easily help us build the association rules which can help us detect possible upcoming multi-step attacks in real-time system. As to future work we currently use correlativity to measure the correlation-ship between pair nodes in pseudo-attack-link to determine if the link is real attack pattern or not. We only consider four attributes of hyper alert in the calculation of correlativity. We can add more attributes in the formula to further ensure the accuracy of the result in future. Besides how to build the precise rules based on the attack patterns found by our method and how to predict the future attack behaviors are also the research directions we are interested in. References [] Wang Li Li Zhi-tang Lei Jie Li Dong. Attack scenario construction with a new sequential mining technique. 8th ACS nternational Conference on Software Engineering Artificial ntelligence Networking and Parallel/Distributed Computing SNPD [2] Fre de ric Cuppens. Managing alerts in multi-intrusion detection environment. n: Proceedings 7th annual computer security applications conference. New Orleans; 200. p. 22e3. [3] Fre de ric Cuppens Alexandre Mie`ge. Alert correlation in a cooperative intrusion detection framework. n: Proceedings of the 2002 EEE symposium on security and

13 nternational Journal of Network Security Vol.xx No.xx PP.xxx xxx xxx privacy; p. 202e5. [4] Fre de ric Cuppens Fabien Autrel Alexandre Mie`ge Salem Benferhat. Correlation in an intrusion detection process. n: Proceedings SE curite des communications sur internet (SEC02); p. 53e7. [5] P. Ning Y. Cui and D. S. Reeves "Constructing attack scenarios through correlation of intrusion alerts" presented at Proceedings of the 9th ACM Conference on Computer and Communications Security Nov Washington DC United States [6] P. Ning Y. Cui D. S. Reeves and D. Xu "Techniques and tools for analyzing intrusion alerts" ACM Transactions on nformation and System Security vol. 7 pp [7] P. Ning and D. Xu "Alert correlation through triggering events and common resources" Tucson AZ USA 2004 [8] C. Araujo A. Biazetti A. Bussani J. Dinger M. Feridun and A. Tanner "Simplifying correlation rule creation for effective systems monitoring" presented at Utility Computing. 5th FP/EEE nternational Workshop on Distributed Systems: Operations and Management DSOM Proceedings 5-7 Nov Davis CA USA [9] K. Julisch "Clustering intrusion detection alarms to support root cause analysis" Edmonton Alta Canada [0] K. Julisch "Mining alarm clusters to improve alarm handling efficiency" New Orleans LA USA 200. [] Valdes A. and Skinner K. Probabilistic alert correlation in Proceedings of the 4th nternational Symposium on Recent Advances in ntrusion Detection (RAD) October 200. [2] Sheyner O. Haines J. Jha S. Lippmann R. and Wing J. M. Automated generation and analysis of attack graphs in Proceedings of the 2002 EEE Symposium on Security and Privacy (Oakland CA) May [3] W. Lee and X. Qin "Statistical Causality Analysis of NFOSEC Alert Data" presented at RAD2003. [4] Q. Xinzhou and L. Wenke "Discovering novel attack strategies from NFOSEC alerts" Sophia Antipolis France [5] MT Lincoln Lab DARPA ntrusion Detection Scenario Specific Data Sets _data_index.html Li Wang is currently a post-doc Researcher at the nformation Security Centre of Computer Science University of New Brunswick. She received her Ph.D. degree from Computer Science Department of Huazhong University of Science and Technology in 2007.

A Rule-Based Intrusion Alert Correlation System for Integrated Security Management *

A Rule-Based Intrusion Alert Correlation System for Integrated Security Management * A Rule-Based Intrusion Correlation System for Integrated Security Management * Seong-Ho Lee 1, Hyung-Hyo Lee 2, and Bong-Nam Noh 1 1 Department of Computer Science, Chonnam National University, Gwangju,

More information

Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack

Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack Faeiz M. Alserhani College of Computer & Information Sciences, Dep. of Computer Engineering

More information

Alert Correlation System with Automatic Extraction of Attack Strategies by Using Dynamic Feature Weights

Alert Correlation System with Automatic Extraction of Attack Strategies by Using Dynamic Feature Weights Alert Correlation System with Automatic Extraction of Attack Strategies by Using Dynamic Feature Weights Chih-Hung Wang*, Ye-Chen Chiou Department of Computer Science and Information Engineering, National

More information

A multi-step attack-correlation method with privacy protection

A multi-step attack-correlation method with privacy protection A multi-step attack-correlation method with privacy protection Research paper A multi-step attack-correlation method with privacy protection ZHANG Yongtang 1, 2, LUO Xianlu 1, LUO Haibo 1 1. Department

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

Extracting Attack Scenarios Using Intrusion Semantics

Extracting Attack Scenarios Using Intrusion Semantics Extracting Attack Scenarios Using Intrusion Semantics Sherif Saad and Issa Traore University of Victoria, BC, Canada shsaad@ece.uvic.ca, itraore@engr.uvic.ca Abstract. Building the attack scenario is the

More information

Multistep Attacks Extraction Using Compiler Techniques 1

Multistep Attacks Extraction Using Compiler Techniques 1 Multistep Attacks Extraction Using Compiler Techniques 1 Safaa O. Al-Mamory, ZHANG Hongli School of Computer Science, Harbin Institute of technology, Harbin, China safaa_vb@yahoo.com, zhl@pact518.hit.edu.cn

More information

Online Intrusion Alert Based on Aggregation and Correlation

Online Intrusion Alert Based on Aggregation and Correlation Online Intrusion Alert Based on Aggregation and Correlation Kunchakarra Anusha 1, K.V.D.Sagar 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur.,

More information

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT environment (e.g., Windows vs Linux) Levels of abstraction

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 Jinqiao Yu Department of Mathematics and Computer Science Illinois Wesleyan Univerisity P.O.Box 2900 Bloomington, IL 61701 Ramana

More information

Detecting and Reacting against Distributed Denial of Service Attacks

Detecting and Reacting against Distributed Denial of Service Attacks Detecting and Reacting against Distributed Denial of Service Attacks Yacine Bouzida Mitsubishi Electric ITE-TCL 1, allée de Beaulieu CS 10806 35708, Rennes, France Bouzida@tcl.ite.mee.com Frédéric Cuppens

More information

ADAPTING QUERY OPTIMIZATION TECHNIQUES FOR EFFICIENT ALERT CORRELATION*

ADAPTING QUERY OPTIMIZATION TECHNIQUES FOR EFFICIENT ALERT CORRELATION* ADAPTING QUERY OPTIMIZATION TECHNIQUES FOR EFFICIENT ALERT CORRELATION* Peng Ning and Dingbang Xu Department of Computer Science North Carolina State University { pning, dxu } @ncsu.edu Abstract Keywords:

More information

An Intrusion Alert Correlator Based on Prerequisites of Intrusions

An Intrusion Alert Correlator Based on Prerequisites of Intrusions An Intrusion Alert Correlator Based on Prerequisites of Intrusions Peng Ning Yun Cui Department of Computer Science North Carolina State University Raleigh, NC 27695-7534 Email: ning@csc.ncsu.edu, ycui4@eos.ncsu.edu

More information

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa

More information

Bayesian Learning Networks Approach to Cybercrime Detection

Bayesian Learning Networks Approach to Cybercrime Detection Bayesian Learning Networks Approach to Cybercrime Detection N S ABOUZAKHAR, A GANI and G MANSON The Centre for Mobile Communications Research (C4MCR), University of Sheffield, Sheffield Regent Court, 211

More information

A Response Strategy Model for Intrusion Response Systems

A Response Strategy Model for Intrusion Response Systems A Response Strategy Model for Intrusion Response Systems Nor Badrul Anuar 1,2, Maria Papadaki 1, Steven Furnell 1,3, and Nathan Clarke 1,3 1 Centre for Security, Communications and Network Research (CSCAN),

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System

Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System Ja-Min Koo and Sung-Bae Cho Dept. of Computer Science, Yonsei University, Shinchon-dong, Seodaemoon-ku,

More information

HUMAN activities associated with computational devices

HUMAN activities associated with computational devices INTRUSION ALERT PREDICTION USING A HIDDEN MARKOV MODEL 1 Intrusion Alert Prediction Using a Hidden Markov Model Udaya Sampath K. Perera Miriya Thanthrige, Jagath Samarabandu and Xianbin Wang arxiv:1610.07276v1

More information

Data Mining for Improving Intrusion Detection

Data Mining for Improving Intrusion Detection Data Mining for Improving Intrusion Detection presented by: Dr. Eric Bloedorn Team members: Bill Hill (PI) Dr. Alan Christiansen, Dr. Clem Skorupka, Dr. Lisa Talbot, Jonathan Tivel 12/6/00 Overview Background

More information

Systematic Detection And Resolution Of Firewall Policy Anomalies

Systematic Detection And Resolution Of Firewall Policy Anomalies Systematic Detection And Resolution Of Firewall Policy Anomalies 1.M.Madhuri 2.Knvssk Rajesh Dept.of CSE, Kakinada institute of Engineering & Tech., Korangi, kakinada, E.g.dt, AP, India. Abstract: In this

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

Mobile Agent Based Adaptive Intrusion Detection and Prevention Systems

Mobile Agent Based Adaptive Intrusion Detection and Prevention Systems Vol. 5, 108 Mobile Agent Based Adaptive Intrusion Detection and Prevention Systems 1 Ameya Gangamwar, 2 Anand Kanani, 3 Vivek Singh, 4 Rachana Srivastav and 5 Deven Shah Abstract- The proposed system using

More information

A Flexible Approach to Intrusion Alert Anonymization and Correlation

A Flexible Approach to Intrusion Alert Anonymization and Correlation A Fleible Approach to Intrusion Alert Anonymization and Correlation Dingbang Xu and Peng Ning Cyber Defense aboratory Department of Computer Science North Carolina State University Raleigh, NC 27695-826

More information

A Framework for Securing Databases from Intrusion Threats

A Framework for Securing Databases from Intrusion Threats A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:

More information

Multivariate Correlation Analysis based detection of DOS with Tracebacking

Multivariate Correlation Analysis based detection of DOS with Tracebacking 1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor

More information

Scenario Recognition based on Collaborative Attack Modeling in Intrusion Detection

Scenario Recognition based on Collaborative Attack Modeling in Intrusion Detection Scenario Recognition based on Collaborative Attack Modeling in Intrusion Detection Xuejiao Liu, Debao Xiao, Ting Gu and Hui Xu Student Member IEEE Abstract Recently, intrusion detection products have become

More information

This shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict

This shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict 1 This shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict access between segments This creates a layered defense

More information

An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction

An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction International Journal of Engineering Science Invention Volume 2 Issue 1 January. 2013 An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction Janakiramaiah Bonam 1, Dr.RamaMohan

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Techniques and Tools for Analyzing Intrusion Alerts

Techniques and Tools for Analyzing Intrusion Alerts Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level

More information

Keywords Intrusion Detection System, Artificial Neural Network, Multi-Layer Perceptron. Apriori algorithm

Keywords Intrusion Detection System, Artificial Neural Network, Multi-Layer Perceptron. Apriori algorithm Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Detecting and Classifying

More information

The Pennsylvania State University. The Graduate School. Department of Computer Science and Engineering

The Pennsylvania State University. The Graduate School. Department of Computer Science and Engineering The Pennsylvania State University The Graduate School Department of Computer Science and Engineering CONTEXT-DRIVEN SIMILARITY-BASED RETRIEVAL OF CYBER ANALYST EXPERIENCES FOR MULTI-STEP ATTACK ANALYSIS

More information

Mining Frequent Itemsets for data streams over Weighted Sliding Windows

Mining Frequent Itemsets for data streams over Weighted Sliding Windows Mining Frequent Itemsets for data streams over Weighted Sliding Windows Pauray S.M. Tsai Yao-Ming Chen Department of Computer Science and Information Engineering Minghsin University of Science and Technology

More information

Improving the Efficiency of Fast Using Semantic Similarity Algorithm

Improving the Efficiency of Fast Using Semantic Similarity Algorithm International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 1 Improving the Efficiency of Fast Using Semantic Similarity Algorithm D.KARTHIKA 1, S. DIVAKAR 2 Final year

More information

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE

More information

Web Data mining-a Research area in Web usage mining

Web Data mining-a Research area in Web usage mining IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,

More information

Detecting Clusters and Outliers for Multidimensional

Detecting Clusters and Outliers for Multidimensional Kennesaw State University DigitalCommons@Kennesaw State University Faculty Publications 2008 Detecting Clusters and Outliers for Multidimensional Data Yong Shi Kennesaw State University, yshi5@kennesaw.edu

More information

Discovering Novel Attack Strategies from INFOSEC Alerts

Discovering Novel Attack Strategies from INFOSEC Alerts iscovering Novel Attack Strategies from INFOSEC Alerts Xinzhou Qin and Wenke Lee College of Computing Georgia Institute of Technology Atlanta, GA 30332, USA xinzhou, wenke @cc.gatech.edu Abstract. Correlating

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ISSN: 2229-6948 (ONLINE) ICTACT JOURNAL OF COMMUNICATION TECHNOLOGY, JUNE 2010, VOLUME: 01, ISSUE: 02 DOI: 10.21917/ijct.2010.0013 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

Application of Case-Based Reasoning to Multi-Sensor Network Intrusion Detection

Application of Case-Based Reasoning to Multi-Sensor Network Intrusion Detection Application of Case-Based Reasoning to Multi-Sensor Network Intrusion Detection Jidong Long, Daniel Schwartz, and Sara Stoecklin Department of Computer Science Florida State University Tallahassee, Florida

More information

Intelligent Risk Identification and Analysis in IT Network Systems

Intelligent Risk Identification and Analysis in IT Network Systems Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au

More information

Reasoning about Complementary Intrusion Evidence

Reasoning about Complementary Intrusion Evidence Reasoning about Complementary Intrusion Evidence Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

More information

An Online Adaptive Approach to Alert Correlation

An Online Adaptive Approach to Alert Correlation An Online Adaptive Approach to Alert Correlation Hanli Ren, Natalia Stakhanova, and Ali A. Ghorbani Information Security Center of excellence University of New Brunswick Fredericton, New Brunswick, Canada

More information

A New System for Clustering and Classification of Intrusion Detection System Alerts Using Self-Organizing Maps

A New System for Clustering and Classification of Intrusion Detection System Alerts Using Self-Organizing Maps A New System for Clustering and Classification of Intrusion Detection System Alerts Using Self-Organizing Maps Amir Azimi Alasti Ahrabi Ahmad Habibizad Navin Islamic Azad University, Science and Research

More information

Data Mining for Intrusion Detection: from Outliers to True Intrusions

Data Mining for Intrusion Detection: from Outliers to True Intrusions Data Mining for Intrusion Detection: from Outliers to True Intrusions Goverdhan Singh 1, Florent Masseglia 1, Cline Fiot 1, Alice Marascu 1, and Pascal Poncelet 2 1 INRIA Sophia Antipolis, 2004 route des

More information

UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA

UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA METANAT HOOSHSADAT, SAMANEH BAYAT, PARISA NAEIMI, MAHDIEH S. MIRIAN, OSMAR R. ZAÏANE Computing Science Department, University

More information

Network Forensics Analysis with Evidence Graphs

Network Forensics Analysis with Evidence Graphs DIGITAL FORENSIC RESEARCH CONFERENCE Network Forensics Analysis with Evidence Graphs By Wei Wang and Thomas Daniels From the proceedings of The Digital Forensic Research Conference DFRWS 2005 USA New Orleans,

More information

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA

More information

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK P.Priya 1, S.Tamilvanan 2 1 M.E-Computer Science and Engineering Student, Bharathidasan Engineering College, Nattrampalli. 2

More information

Network Anomaly Detection Using Autonomous System Flow Aggregates

Network Anomaly Detection Using Autonomous System Flow Aggregates Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering 2 Department of Computer Science University

More information

Image Mining: frameworks and techniques

Image Mining: frameworks and techniques Image Mining: frameworks and techniques Madhumathi.k 1, Dr.Antony Selvadoss Thanamani 2 M.Phil, Department of computer science, NGM College, Pollachi, Coimbatore, India 1 HOD Department of Computer Science,

More information

Lecture #8: Correlation. Matthijs Koot / SNE-IDS college 07-08

Lecture #8: Correlation. Matthijs Koot / SNE-IDS college 07-08 Lecture #8: Correlation Faculteit van Natuurwetenschappen, Wiskunde en Informatica Universiteit van Amsterdam 2008-04-24 / SNE-IDS college 07-08 Outline Common problems with point-solution IDSs. Common

More information

Online Pattern Recognition in Multivariate Data Streams using Unsupervised Learning

Online Pattern Recognition in Multivariate Data Streams using Unsupervised Learning Online Pattern Recognition in Multivariate Data Streams using Unsupervised Learning Devina Desai ddevina1@csee.umbc.edu Tim Oates oates@csee.umbc.edu Vishal Shanbhag vshan1@csee.umbc.edu Machine Learning

More information

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM Assosiate professor, PhD Evgeniya Nikolova, BFU Assosiate professor, PhD Veselina Jecheva,

More information

Feature Selection Technique to Improve Performance Prediction in a Wafer Fabrication Process

Feature Selection Technique to Improve Performance Prediction in a Wafer Fabrication Process Feature Selection Technique to Improve Performance Prediction in a Wafer Fabrication Process KITTISAK KERDPRASOP and NITTAYA KERDPRASOP Data Engineering Research Unit, School of Computer Engineering, Suranaree

More information

A TOOLKIT FOR INTRUSION ALERTS CORRELATION BASED ON PREREQUISITES AND CONSEQUENCES OF ATTACKS

A TOOLKIT FOR INTRUSION ALERTS CORRELATION BASED ON PREREQUISITES AND CONSEQUENCES OF ATTACKS Abstract CUI, YUN. A Toolkit for Intrusion Alerts Correlation Based on Prerequisites and Consequences of Attacks. (Under the direction of Dr. Peng Ning.) Intrusion Detection has been studied for about

More information

Correlation Based Feature Selection with Irrelevant Feature Removal

Correlation Based Feature Selection with Irrelevant Feature Removal Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Intruders & Attacks Cyber criminals Activists State-sponsored organizations Advanced Persistent

More information

Intrusion Detection Using Data Mining Technique (Classification)

Intrusion Detection Using Data Mining Technique (Classification) Intrusion Detection Using Data Mining Technique (Classification) Dr.D.Aruna Kumari Phd 1 N.Tejeswani 2 G.Sravani 3 R.Phani Krishna 4 1 Associative professor, K L University,Guntur(dt), 2 B.Tech(1V/1V),ECM,

More information

Research on outlier intrusion detection technologybased on data mining

Research on outlier intrusion detection technologybased on data mining Acta Technica 62 (2017), No. 4A, 635640 c 2017 Institute of Thermomechanics CAS, v.v.i. Research on outlier intrusion detection technologybased on data mining Liang zhu 1, 2 Abstract. With the rapid development

More information

Comprehensive Security Framework for Global Threats Analysis

Comprehensive Security Framework for Global Threats Analysis IJCSI International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 18 Comprehensive Security Framework for Global Threats Analysis Jacques SARAYDARYAN

More information

CIS UDEL Working Notes on ImageCLEF 2015: Compound figure detection task

CIS UDEL Working Notes on ImageCLEF 2015: Compound figure detection task CIS UDEL Working Notes on ImageCLEF 2015: Compound figure detection task Xiaolong Wang, Xiangying Jiang, Abhishek Kolagunda, Hagit Shatkay and Chandra Kambhamettu Department of Computer and Information

More information

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

Analyzing Dshield Logs Using Fully Automatic Cross-Associations

Analyzing Dshield Logs Using Fully Automatic Cross-Associations Analyzing Dshield Logs Using Fully Automatic Cross-Associations Anh Le 1 1 Donald Bren School of Information and Computer Sciences University of California, Irvine Irvine, CA, 92697, USA anh.le@uci.edu

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

CHAPTER VII INDEXED K TWIN NEIGHBOUR CLUSTERING ALGORITHM 7.1 INTRODUCTION

CHAPTER VII INDEXED K TWIN NEIGHBOUR CLUSTERING ALGORITHM 7.1 INTRODUCTION CHAPTER VII INDEXED K TWIN NEIGHBOUR CLUSTERING ALGORITHM 7.1 INTRODUCTION Cluster analysis or clustering is the task of grouping a set of objects in such a way that objects in the same group (called cluster)

More information

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks An Based on the Temporal-spatial Correlation in Wireless Sensor Networks 1 Department of Computer Science & Technology, Harbin Institute of Technology at Weihai,Weihai, 264209, China E-mail: Liuyang322@hit.edu.cn

More information

IJCSNT, Vol.7, No.2, 2018 DOI /ijcsnt An Approach to Meta-Alert Generation to Reduce Analyst Workload

IJCSNT, Vol.7, No.2, 2018 DOI /ijcsnt An Approach to Meta-Alert Generation to Reduce Analyst Workload An Approach to Meta-Alert Generation to Reduce Analyst Workload Deeksha Kushwah Department of CSE & IT Madhav Institute of Technology and Science Gwalior, India deekshakushwah0@gmail.com Rajni Ranjan Singh

More information

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction

More information

Security Control Methods for Statistical Database

Security Control Methods for Statistical Database Security Control Methods for Statistical Database Li Xiong CS573 Data Privacy and Security Statistical Database A statistical database is a database which provides statistics on subsets of records OLAP

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

K-Nearest-Neighbours with a Novel Similarity Measure for Intrusion Detection

K-Nearest-Neighbours with a Novel Similarity Measure for Intrusion Detection K-Nearest-Neighbours with a Novel Similarity Measure for Intrusion Detection Zhenghui Ma School of Computer Science The University of Birmingham Edgbaston, B15 2TT Birmingham, UK Ata Kaban School of Computer

More information

Auto Finding and Resolving Distributed Firewall Policy

Auto Finding and Resolving Distributed Firewall Policy IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 5 (Mar. - Apr. 2013), PP 56-60 Auto Finding and Resolving Distributed Firewall Policy Arunkumar.k 1,

More information

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X Analysis about Classification Techniques on Categorical Data in Data Mining Assistant Professor P. Meena Department of Computer Science Adhiyaman Arts and Science College for Women Uthangarai, Krishnagiri,

More information

Feature selection using closeness to centers for network intrusion detection

Feature selection using closeness to centers for network intrusion detection Feature selection using closeness to centers for network intrusion detection 1 S. Sethuramalingam, 2 Dr. E.R. Naganathan 1 Department of Computer Science, Aditanar College, Tiruchur, India 2 Department

More information

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks An efficient intrusion detection framework in cluster-based wireless sensor networks Paper: A lightweight hybrid security framework

More information

Discovering Advertisement Links by Using URL Text

Discovering Advertisement Links by Using URL Text 017 3rd International Conference on Computational Systems and Communications (ICCSC 017) Discovering Advertisement Links by Using URL Text Jing-Shan Xu1, a, Peng Chang, b,* and Yong-Zheng Zhang, c 1 School

More information

Performance Improvement of Hardware-Based Packet Classification Algorithm

Performance Improvement of Hardware-Based Packet Classification Algorithm Performance Improvement of Hardware-Based Packet Classification Algorithm Yaw-Chung Chen 1, Pi-Chung Wang 2, Chun-Liang Lee 2, and Chia-Tai Chan 2 1 Department of Computer Science and Information Engineering,

More information

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data Nian Zhang and Lara Thompson Department of Electrical and Computer Engineering, University

More information

Measuring Intrusion Detection Capability: An Information- Theoretic Approach

Measuring Intrusion Detection Capability: An Information- Theoretic Approach Measuring Intrusion Detection Capability: An Information- Theoretic Approach Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee Georgia Tech Boris Skoric Philips Research Lab Outline Motivation Problem Why

More information

New Approaches to Distributed Management to Achieve Scalability and Robustness

New Approaches to Distributed Management to Achieve Scalability and Robustness New Approaches to Distributed Management to Achieve Scalability and Robustness Rolf Stadler Laboratory for Communication Networks KTH Royal Institute of Technology Stockholm, Sweden 19 th NMRG Meeting,

More information

Method for security monitoring and special filtering traffic mode in info communication systems

Method for security monitoring and special filtering traffic mode in info communication systems Method for security monitoring and special filtering traffic mode in info communication systems Sherzod Rajaboyevich Gulomov Provide Information Security department Tashkent University of Information Technologies

More information

Flow-based Worm Detection using Correlated Honeypot Logs

Flow-based Worm Detection using Correlated Honeypot Logs Flow-based Worm Detection using Correlated Honeypot Logs Falko Dressler, Wolfgang Jaegers, and Reinhard German Computer Networks and Communication Systems, University of Erlangen, Martensstr. 3, 91058

More information

DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY) SEQUENTIAL PATTERN MINING A CONSTRAINT BASED APPROACH

DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY) SEQUENTIAL PATTERN MINING A CONSTRAINT BASED APPROACH International Journal of Information Technology and Knowledge Management January-June 2011, Volume 4, No. 1, pp. 27-32 DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY)

More information

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Transforming Security from Defense in Depth to Comprehensive Security Assurance Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new

More information

Robot localization method based on visual features and their geometric relationship

Robot localization method based on visual features and their geometric relationship , pp.46-50 http://dx.doi.org/10.14257/astl.2015.85.11 Robot localization method based on visual features and their geometric relationship Sangyun Lee 1, Changkyung Eem 2, and Hyunki Hong 3 1 Department

More information

A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures

A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures James J. Treinen 1 and Ramakrishna Thurimella 2 1 IBM Global Services, Boulder, CO 80301, USA jamestr@us.ibm.com

More information

A Framework for Source Code metrics

A Framework for Source Code metrics A Framework for Source Code metrics Neli Maneva, Nikolay Grozev, Delyan Lilov Abstract: The paper presents our approach to the systematic and tool-supported source code measurement for quality analysis.

More information

SHOTGUN SURGERY DESIGN FLAW DETECTION. A CASE-STUDY

SHOTGUN SURGERY DESIGN FLAW DETECTION. A CASE-STUDY STUDIA UNIV. BABEŞ BOLYAI, INFORMATICA, Volume LVIII, Number 4, 2013 SHOTGUN SURGERY DESIGN FLAW DETECTION. A CASE-STUDY CAMELIA ŞERBAN Abstract. Due to the complexity of object oriented design, its assessment

More information

Approach Using Genetic Algorithm for Intrusion Detection System

Approach Using Genetic Algorithm for Intrusion Detection System Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-

More information

Detecting Protected Layer-3 Rogue APs

Detecting Protected Layer-3 Rogue APs Detecting Protected Layer-3 Rogue APs Authors: Hongda Yin, Guanling Chen, and Jie Wang Department of Computer Science, University of Massachusetts Lowell Presenter: Bo Yan Department of Computer Science

More information

Co-clustering for differentially private synthetic data generation

Co-clustering for differentially private synthetic data generation Co-clustering for differentially private synthetic data generation Tarek Benkhelif, Françoise Fessant, Fabrice Clérot and Guillaume Raschia January 23, 2018 Orange Labs & LS2N Journée thématique EGC &

More information

Statistical based Approach for Packet Classification

Statistical based Approach for Packet Classification Statistical based Approach for Packet Classification Dr. Mrudul Dixit 1, Ankita Sanjay Moholkar 2, Sagarika Satish Limaye 2, Devashree Chandrashekhar Limaye 2 Cummins College of engineering for women,

More information

Improved Frequent Pattern Mining Algorithm with Indexing

Improved Frequent Pattern Mining Algorithm with Indexing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov Dec. 2014), PP 73-78 Improved Frequent Pattern Mining Algorithm with Indexing Prof.

More information

Global Journal of Engineering Science and Research Management

Global Journal of Engineering Science and Research Management CONFIGURATION FILE RECOMMENDATIONS USING METADATA AND FUZZY TECHNIQUE Gnanamani.H*, Mr. C.V. Shanmuka Swamy * PG Student Department of Computer Science Shridevi Institute Of Engineering and Technology

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information