• DocumentCode
    604373
  • Title

    A multi-step attack pattern discovery method based on graph mining

  • Author

    Xu Jinghu ; Li Aiping ; Zhao Hui ; Yin Hong

  • Author_Institution
    Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
  • fYear
    2012
  • fDate
    29-31 Dec. 2012
  • Firstpage
    376
  • Lastpage
    380
  • Abstract
    One fundamental challenge for Alert Correlation(AC) is to learn attack strategies. Attack graph is one of the most commonly used models to describe attack patterns(strategies), however, attack graph generating technology is far from practical. There are two general approaches to generate attack graphs. The first uses graph based search technology to find the paths of possible attacks, such as model checking, assumes that the premises and consequences of the attacks are known. And the other makes use of statistical method, such as frequent sequence mining, try to find the relationship of attacks in the dimension of time. In this paper, we proposed a graph mining based approach to discover attack patterns for attack graph generating. Firstly, we propose a new structure ECG, and transform sequential events into ECG, in which their time sequential and space relations is reserved. Moreover, we propose a DAG mining algorithm to discovery the frequent graph patterns from the ECG, and finally transform the graph patterns into attack graph. Different to existing methods, our method finds relationship of attacks in the dimension of both time and space, so that it can detect attacks more concisely. The effectiveness and efficiency of the approach is validated by DARPA 1999, 2000 intrusion detection evaluation datasets. As far as we know, this is the first time to discover knowledge of attack based on graph mining.
  • Keywords
    data mining; directed graphs; security of data; DAG mining algorithm; ECG; alert correlation; attack graph generating technology; attack strategies; frequent sequence mining; graph based search technology; graph mining based approach; intrusion detection evaluation datasets; knowledge discovery; model checking; multistep attack pattern discovery method; sequential events; space relations; statistical method; time sequential relations; alert correlation; attack graph; data mining;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and Network Technology (ICCSNT), 2012 2nd International Conference on
  • Conference_Location
    Changchun
  • Print_ISBN
    978-1-4673-2963-7
  • Type

    conf

  • DOI
    10.1109/ICCSNT.2012.6525959
  • Filename
    6525959