TY - JOUR
T1 - Boosting performance in attack intention recognition by integrating multiple techniques
AU - Bai, Hao
AU - Wang, Kunsheng
AU - Hu, Changzhen
AU - Zhang, Gang
AU - Jing, Xiaochuan
PY - 2011/3
Y1 - 2011/3
N2 - Recognizing attack intention is crucial for security analysis. In recent years, a number of methods for attack intention recognition have been proposed. However, most of these techniques mainly focus on the alerts of an intrusion detection system and use algorithms of low efficiency that mine frequent attack patterns without reconstructing attack paths. In this paper, a novel and effective method is proposed, which integrates several techniques to identify attack intentions. Using this method, a Bayesian-based attack scenario is constructed, where frequent attack patterns are identified using an efficient data-mining algorithm based on frequent patterns. Subsequently, attack paths are rebuilt by recorrelating frequent attack patterns mined in the scenario. The experimental results demonstrate the capability of our method in rebuilding attack paths, recognizing attack intentions as well as in saving system resources. Specifically, to the best of our knowledge, the proposed method is the first to correlate complementary intrusion evidence with frequent pattern mining techniques based on the FP-Growth algorithm to rebuild attack paths and to recognize attack intentions.
AB - Recognizing attack intention is crucial for security analysis. In recent years, a number of methods for attack intention recognition have been proposed. However, most of these techniques mainly focus on the alerts of an intrusion detection system and use algorithms of low efficiency that mine frequent attack patterns without reconstructing attack paths. In this paper, a novel and effective method is proposed, which integrates several techniques to identify attack intentions. Using this method, a Bayesian-based attack scenario is constructed, where frequent attack patterns are identified using an efficient data-mining algorithm based on frequent patterns. Subsequently, attack paths are rebuilt by recorrelating frequent attack patterns mined in the scenario. The experimental results demonstrate the capability of our method in rebuilding attack paths, recognizing attack intentions as well as in saving system resources. Specifically, to the best of our knowledge, the proposed method is the first to correlate complementary intrusion evidence with frequent pattern mining techniques based on the FP-Growth algorithm to rebuild attack paths and to recognize attack intentions.
KW - FP-Growth
KW - attack intention
KW - attack path
KW - compensatory intrusion evidence
UR - http://www.scopus.com/inward/record.url?scp=79952067608&partnerID=8YFLogxK
U2 - 10.1007/s11704-010-0321-y
DO - 10.1007/s11704-010-0321-y
M3 - Article
AN - SCOPUS:79952067608
SN - 1673-7350
VL - 5
SP - 109
EP - 118
JO - Frontiers of Computer Science in China
JF - Frontiers of Computer Science in China
IS - 1
ER -