Recognition of attack strategy based on FP-growth algorithm and compensatory intrusion evidence

Hao Bai*, Kun Sheng Wang, Chang Zhen Hu, Gang Zhang, Xiao Chuan Jing

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

1 引用 (Scopus)

摘要

Limitations existed with current methods for attack intention recognition. For instance, they lacked compensatory intrusion evidences, cost enormous system resources and had low precision. To avoid the above flaws, a novel and effective method is proposed. The method generated compensatory intrusion evidences by fusing data from IDS and other security kits like scanner. Then, Bayesian-based attack scenarios were constructed where frequent attack patterns were identified using an efficient data-mining algorithm based on frequent patterns. Finally, attack paths were rebuilt by re-correlating frequent attack patterns mined in the scenarios to judge possible attack strategies precisely. The experimental results demonstrate the capability of the proposed method in rebuilding attack paths, recognizing attack intentions as well as in saving system resources.

源语言英语
页(从-至)930-934
页数5
期刊Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology
30
8
出版状态已出版 - 8月 2010

指纹

探究 'Recognition of attack strategy based on FP-growth algorithm and compensatory intrusion evidence' 的科研主题。它们共同构成独一无二的指纹。

引用此