4.6 Article

Online Mining Intrusion Patterns from IDS Alerts

Journal

APPLIED SCIENCES-BASEL
Volume 10, Issue 8, Pages -

Publisher

MDPI
DOI: 10.3390/app10082983

Keywords

IDS (Intrusion Detection System) alerts; intrusion pattern; intrusion scenarios; correlation analysis; intrusion detection; attack scenario; online mining; sequence learning; pattern mining

Funding

  1. National Key R&D Program of China [2017YFB0802300]
  2. Major Scientific and Technological Special Project of Guizhou Province [20183001]
  3. Foundation of Guizhou Provincial Key Laboratory of Public Big Data [2018BDKFJJ008, 2018BDKFJJ020, 2018BDKFJJ021]

Ask authors/readers for more resources

Featured Application In this paper, an influence model is proposed to tackle the sequence data analysis problems such as disordering, element missing and random noises. The proposed method can be used for mining intrusion patterns from the intrusion action sequence extracted from IDS (Intrusion Detection System) alerts. Abstract The intrusion detection system (IDS) which is used widely in enterprises, has produced a large number of logs named alerts, from which the intrusion patterns can be mined. These patterns can be used to construct the intrusion scenarios or discover the final objectives of the malicious actors, and even assist the forensic works of network crimes. In this paper, a novel algorithm for the intrusion pattern mining is proposed which aimsto solve the difficult problems of the intrusion action sequence such as the loss of important intrusion actions, the disorder of the action sequence and the random noise actions. These common problems often occur in the real production environment which cause serious performance decrease in the analyzing system. The proposed algorithm is based on the online analysis of the intrusion action sequences extracted from IDS alerts, through calculating the influences of a particular action on the subsequent actions, the real intrusion patterns are discovered. The experimental results show that the method is effective in discovering pattern from the complex intrusion action sequences.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available