Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs

05/16/2019
by   Steffen Haas, et al.
0

An Intrusion Detection System (IDS) to secure computer networks reports indicators for an attack as alerts. However, every attack can result in a multitude of IDS alerts that need to be correlated to see the full picture of the attack. In this paper, we present a correlation approach that transforms clusters of alerts into a graph structure on which we compute signatures of network motifs to characterize these clusters. A motif representation of attack characteristics is magnitudes smaller than the original alert data, but still allows to efficiently compare and correlate attacks with each other and with reference signatures. This allows not only to identify known attack scenarios, e.g., DDoS, scan, and worm attacks, but also to derive new reference signatures for unknown scenarios. Our results indicate a reliable identification of scenarios, even when attacks differ in size and at least slightly in their characteristics. Applied on real-world alert data, our approach can classify and assign attack scenarios of up to 96 characteristics using 1

READ FULL TEXT
research
10/16/2021

An Effective Attack Scenario Construction Model based on Attack Steps and Stages Identification

A Network Intrusion Detection System (NIDS) is a network security techno...
research
12/17/2020

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

In this paper, we present a study that proposes a three-stage classifier...
research
11/01/2018

Spectral Signatures in Backdoor Attacks

A recent line of work has uncovered a new form of data poisoning: so-cal...
research
04/23/2010

Real-Time Alert Correlation with Type Graphs

The premise of automated alert correlation is to accept that false alert...
research
01/06/2018

SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data

We present an approach and system for real-time reconstruction of attack...
research
08/08/2019

De-anonymization Attacks on Neuroimaging Datasets

Advances in imaging technologies, combined with inexpensive storage, hav...
research
06/09/2010

Building Computer Network Attacks

In this work we start walking the path to a new perspective for viewing ...

Please sign up or login with your details

Forgot password? Click here to reset