Multi-Stage Network Attack Detection Algorithm Based on Gaussian Mixture Hidden Markov Model and Transfer Learning

被引:4
作者
Wang, Qian [1 ]
Wang, Weilong [1 ]
Wang, Yan [2 ]
Ren, Jiadong [1 ]
Zhang, Bing [1 ]
机构
[1] Yanshan Univ, Sch Informat Sci & Engn, Key Lab Comp Virtual Technol & Syst Integrat, Qinhuangdao 066004, Hebei, Peoples R China
[2] Northeastern Univ Qinhuangdao, Comp Ctr, Qinhuangdao 066004, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-stage network attack; Gaussian mixture model; hidden Markov model; transfer learning; ANOMALY DETECTION;
D O I
10.1109/TASE.2024.3395355
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-stage network attack (MSA) is a serious threat to data security. The high-dimensionality of the alert data along with the diverse features, leads to poor detection performance for MSA. Consequently, this paper proposes a multi-stage network attack detection algorithm based on Gaussian mixture hidden Markov model and transfer learning. Firstly, a sequence modeling framework of Gaussian mixture hidden Markov models is proposed. It uses a Gaussian mixture model to cluster high-dimensional alert data and a hidden Markov model to fully consider the temporal structure of MSA, the alert features of each stage, and transitions between stages. Secondly, optimized Baum-Welch and Viterbi algorithms are proposed, combined with the forward-backward algorithm to train the parameter of the Gaussian mixture hidden Markov model and detect the attack sequence of MSA. Finally, an improved transfer learning method is proposed, which addresses the sparsity of labeled data in MSA scenarios, a Kullback-Leibler (KL) divergence value is added as a penalty term to narrow the distribution differences between the source and target domains and solves the bias problem in the transfer learning process. The proposed algorithm is validated on the datasets DARPA 2000 and CSE-CIC-IDS2018, and the effectiveness and superiority is verified on multiple evaluation indicators. Note to Practitioners-Network attacks gradually show the large-scale, coordinated and multi-stage characteristics. Complex multi-step attacks with strong concealment and persistence have become the development trend of network attacks, which seriously threaten and infringe the secure storage and transmission of information. Most existing studies use hidden Markov model (HMM) to model multi-stage network attacks. HMM is usually more suitable for multi-step attacks occurring in a specific sequence within a continuous time interval. However, in actual multi-stage network attacks, attackers do not need to follow the exact sequence of multi-step attacks, and the intervals between successive stages of an attack can be hours, days, or even months. Attackers may also perform interleaved attacks to hide attacks. Therefore, this paper proposes a multi-stage network attack detection algorithm based on Gaussian hybrid hidden Markov and transfer learning. The optimized Gaussian hybrid hidden Markov model is used to model the alert data of multi-stage network attacks, and the improved transfer learning method is adopted to apply the knowledge learned from the source domain to the multi-stage network attack detection model of the target domain. The experimental results show that the proposed algorithm can effectively process the alert data of different attack stages under complex multi-stage network attacks, distinguish the real threat alert, false alert and irrelevant alert, and improve the performance of detecting multi-stage network attacks. The method presented in this paper can provide a valuable solution for complex multi-stage network attack detection such as advanced persistent threat (APT). Future work will further combine adversarial generation network methods to avoid the interference of adversarial attack samples, and explore more ways to improve the performance of multi-step attack detection.
引用
收藏
页码:3470 / 3484
页数:15
相关论文
共 40 条
[1]   Fundamental Limits for Learning Hidden Markov Model Parameters [J].
Abraham, Kweku ;
Gassiat, Elisabeth ;
Naulet, Zacharie .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (03) :1777-1794
[2]  
[Anonymous], 2020, Snort-Network Intrusion Detection & Prevention System
[3]  
[Anonymous], 2020, CSE-CIC-IDS2018 on AWS
[4]  
[Anonymous], 2020, DARPA Intrusion Detection Scenario Specific Datasets
[5]   A new platform for machine-learning-based network traffic classification [J].
Bozkir, Ramazan ;
Cicioglu, Murtaza ;
Calhan, Ali ;
Togay, Cengiz .
COMPUTER COMMUNICATIONS, 2023, 208 :1-14
[6]   A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records [J].
Breier, Jakub ;
Branisova, Jana .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) :497-511
[7]   Learning to Learn Sequential Network Attacks Using Hidden Markov Models [J].
Chadza, Timothy ;
Kyriakopoulos, Konstantinos G. ;
Lambotharan, Sangarapillai .
IEEE ACCESS, 2020, 8 :134480-134497
[8]   Contemporary Sequential Network Attacks Prediction using Hidden Markov Model [J].
Chadza, Timothy ;
Kyriakopoulos, Konstantinos G. ;
Lambotharan, Sangarapillai .
2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, :333-335
[9]   Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks [J].
Chadza, Timothy ;
Kyriakopoulos, Konstantinos G. ;
Lambotharan, Sangarapillai .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 (108) :636-649
[10]  
Cummings M., 2020, PulledPork