Recognition of attack strategy based on FP-growth algorithm and compensatory intrusion evidence

Hao Bai*, Kun Sheng Wang, Chang Zhen Hu, Gang Zhang, Xiao Chuan Jing

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Limitations existed with current methods for attack intention recognition. For instance, they lacked compensatory intrusion evidences, cost enormous system resources and had low precision. To avoid the above flaws, a novel and effective method is proposed. The method generated compensatory intrusion evidences by fusing data from IDS and other security kits like scanner. Then, Bayesian-based attack scenarios were constructed where frequent attack patterns were identified using an efficient data-mining algorithm based on frequent patterns. Finally, attack paths were rebuilt by re-correlating frequent attack patterns mined in the scenarios to judge possible attack strategies precisely. The experimental results demonstrate the capability of the proposed method in rebuilding attack paths, recognizing attack intentions as well as in saving system resources.

Original languageEnglish
Pages (from-to)930-934
Number of pages5
JournalBeijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology
Volume30
Issue number8
Publication statusPublished - Aug 2010

Keywords

  • Attack path
  • Attack strategy
  • Compensatory intrusion evidence
  • FP-Growth
  • Frequent attack pattern

Fingerprint

Dive into the research topics of 'Recognition of attack strategy based on FP-growth algorithm and compensatory intrusion evidence'. Together they form a unique fingerprint.

Cite this