DocumentCode :
467809
Title :
Attack Subplan-Based Attack Scenario Correlation
Author :
Chien, Sheng-Hui ; Chang, Erh-Hsien ; Yu, Chih-Yung ; Ho, Cheng-Seen
Author_Institution :
Nat. Taiwan Univ. of Sci. & Technol., Taipei
Volume :
4
fYear :
2007
fDate :
19-22 Aug. 2007
Firstpage :
1881
Lastpage :
1887
Abstract :
There are various security sensors deployed in the network to protect the information assets from destruction. These sensors produce a huge amount of alerts in different event granularities and semantics. Such a huge amount of alerts is hard to be comprehended; as a result, a timely response to the attacks is difficult. Thus, a better technique for alert analysis and management is imperative for promoting the network security. We have developed a two layered PA-based (primitive attack-based) correlation approach to tackle this problem. The first layer does PA construction by integrating related alerts into proper PAs. The second layer is the attack subplan-based correlation layer, which does attack scenario correlation from recognized PAs by employing attack subplan templates to guide the correlation process. This paper focuses on the second layer, by discussing how to automatically construct attack subplan templates, how to eliminate invalid attack subplan templates, how the attack subplan templates can direct the process of scenario correlation, and how a proper fusion process can reduce superfluous attack information. Our experiments show this correlation approach can effectively unearth the attack strategies of the attackers, reduce the cognitive loading of the network manager in comprehending alert reports, and also relieve him from the time consuming and skillful analysis task required in manually analyzing alerts to construct correlation knowledge.
Keywords :
computer network management; security of data; alert analysis; alert management; attack subplan-based attack scenario correlation; attack subplan-based correlation layer; event granularities; information assets protection; network security; primitive attack-based correlation approach; security sensors; Cities and towns; Computer science; Computer security; Cybernetics; Electronic mail; Information security; Intrusion detection; Machine learning; National security; Protection; Attack ontology; Attack scenario; Attack subplan template; Intrusion detection; Primitive attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Machine Learning and Cybernetics, 2007 International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-1-4244-0973-0
Electronic_ISBN :
978-1-4244-0973-0
Type :
conf
DOI :
10.1109/ICMLC.2007.4370455
Filename :
4370455
Link To Document :
بازگشت