Research of snort rule extension and APT detection based on APT network behavior analysis

Yan Cui*, Jingfeng Xue, Yong Wang, Zhenyan Liu, Ji Zhang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

At present, APT attack detection has become the focus of the network security protection field. APT attacks are one of the most difficult attacks in cyber attacks. The complexity and variability of APT attack behavior greatly increases the difficulty of attack detection. In order to cope with APT attack, some well-known network security companies at home and abroad have developed a commercial APT intrusion detection system. This highly targeted attack can not be identified by the traditional intrusion detection system. Therefore, in order to deal with this new type of cyber attack. The paper proposes a new method to detect APT attack from different organizations. Data mining algorithm is used to analyze every organization’s APT network attack behavior and obtain association rules, so as to customize the design of the Snort rules and apply them to intrusion detection system. Experiments have shown that the evaluation index of the intrusion detection system using the extended Snort rule is significantly better than the traditional Snort intrusion detection system when detecting the same test data. The precision of the extended Snort intrusion detection system is as high as 98.3%, and the false alarm rate is almost 0, which ultimately achieves the purpose of APT detection.

Original languageEnglish
Title of host publicationTrusted Computing and Information Security - 12th Chinese Conference, CTCIS 2018, Revised Selected Papers
EditorsHuanguo Zhang, Bo Zhao, Fei Yan
PublisherSpringer Verlag
Pages51-64
Number of pages14
ISBN (Print)9789811359125
DOIs
Publication statusPublished - 2019
Event12th Chinese Conference on Trusted Computing and Information Security, CTCIS 2018 - Wuhan, China
Duration: 18 Oct 201818 Oct 2018

Publication series

NameCommunications in Computer and Information Science
Volume960
ISSN (Print)1865-0929

Conference

Conference12th Chinese Conference on Trusted Computing and Information Security, CTCIS 2018
Country/TerritoryChina
CityWuhan
Period18/10/1818/10/18

Keywords

  • APT
  • Data mining
  • Network behavior
  • Snort rule

Fingerprint

Dive into the research topics of 'Research of snort rule extension and APT detection based on APT network behavior analysis'. Together they form a unique fingerprint.

Cite this