DocumentCode :
552471
Title :
A distributional attack scenario monitoring system based on dynamic peer-to-peer overlay hierarchy
Author :
Nie, Chu-Jiang ; Feng, Dong-Guo ; Han, Zheng-Qing ; Su, Pu-Rui
Author_Institution :
Chinese Inf. Security Key Lab., Chinese Acad. of Sci., Beijing, China
Volume :
1
fYear :
2011
fDate :
10-13 July 2011
Firstpage :
348
Lastpage :
355
Abstract :
Many attacks and suspicious actions cause a huge number of alerts raised by Intrusion Detection Systems (IDSs) on Internet. It is very hot to reveal attacks from these alerts. These alerts are high-quantity but low-quality because of many false alerts raised by IDS and non-relevant alerts caused by different attacks or suspicious actions. We find that various attacks usually adopt similar strategies on internet. So, in this paper, we construct a predefined attack scenario to illustrate the behaviors of attacks and detect attacks adopting known strategies on network. To distinguish different attacks dispersed on cyberspace, we implement a prototype on a novel P2P architecture, which can improve the efficiency of detecting attacks significantly. What is more, our prototype can monitor network in unlimited scale online and perform efficiently and accurately.
Keywords :
Internet; peer-to-peer computing; security of data; IDS; Internet; P2P architecture; cyberspace; distributional attack scenario monitoring system; dynamic peer-to-peer overlay hierarchy; intrusion detection systems; network monitoring; nonrelevant alerts; predefined attack scenario; suspicious actions; Computer architecture; IP networks; Internet; Machine learning; Monitoring; Prototypes; Security; Attack graph; Attack scenario; P2P;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Machine Learning and Cybernetics (ICMLC), 2011 International Conference on
Conference_Location :
Guilin
ISSN :
2160-133X
Print_ISBN :
978-1-4577-0305-8
Type :
conf
DOI :
10.1109/ICMLC.2011.6016716
Filename :
6016716
Link To Document :
بازگشت