Title :
An "Attacker Centric" Cyber Attack Behavior Analysis Technique
Author :
Xuena, Peng ; Hong, Zhao
Author_Institution :
Neusoft Res., Neusoft Co. Ltd., Shenyang
Abstract :
Cyber attack behavior analysis can be roughly classified as "network centric" and "attacker centric" approaches. Compared with traditional "network centric" approach, the key to the implementation of "attacker centric" approach is to decide what to track, in other words, how to find the proper attacker set to be tracked. Current "attacker centric" approach researches mainly focus on single attacker centric behavior analysis, while overlooking the impact of the attacker\´s cooperative relationship on attack behavior analysis. This paper is mainly coping with such scenarios. In this paper, the basic concept and methods of attack behavior tracking and analysis is introduced. As a key technique, the principles of choosing desirable attacker set are discussed, the concepts of attacker group and group member are introduced, and a simple algorithm of attacker group recognition is proposed. Finally, a prototype system based on the proposed approaches is evaluated under DARPA 2000 intrusion detection evaluation datasets. The experimental results show that our approach has potential in analyzing complex cooperative attacks.
Keywords :
security of data; DARPA 2000 intrusion detection evaluation datasets; attacker centric cyber attack behavior analysis technique; attacker group recognition; Data security; Forensics; Image analysis; Information analysis; Information security; Intrusion detection; Protection; Prototypes; Target tracking; Telecommunication traffic; alert correlation; attack behavior; behavior analysis; intrusion detection; network security;
Conference_Titel :
Advanced Communication Technology, The 9th International Conference on
Conference_Location :
Gangwon-Do
Print_ISBN :
978-89-5519-131-8
DOI :
10.1109/ICACT.2007.358789