A multi-step attack identification and correlation method based on multi-information fusion

被引:2
作者
Liao, Niandong [1 ]
Wang, Jiaxun [1 ]
Guan, Jiayu [1 ]
Fan, Hejun [1 ]
机构
[1] Changsha Univ Sci & Technol, Changsha 410114, Peoples R China
关键词
Multi -step attack; Graph attention; LSTM; Attack correlation; ALGORITHM;
D O I
10.1016/j.compeleceng.2024.109249
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuous development of Internet technology, network security issues are becoming more and more complex. In order to obtain or damage user information, attackers usually need to use multiple attack steps to attack different network nodes to achieve the final goal. Currently, traditional intrusion detection mainly focuses on classifying attacks on a single piece of traffic information, and lacks the use of correlation and timing information between multi-step attack traffic to carry out multi-step attack identification and correlation research. To this end, we introduce an edge-based graph attention network to aggregate the neighbor information of flows and use a long short-term memory neural network to obtain time series information. By considering neighbor traffic and time information during the classification process, we are able to achieve accurate classification in multi-step attack scenarios. Then, based on the classification results, the sum of the number of attacks and the number of attacks is counted for each host node. Then standardize the statistical counts of internal network host nodes and external network host nodes and set thresholds to exclude low-risk nodes. Finally, a time-based depth-first traversal algorithm is used to obtain the key attack chain. However, this method may face some challenges, such as high computational complexity, the ability to handle large-scale data, and the generalization ability of the model. Experimental results show that the method we proposed is significantly better than the traditional method in terms of accuracy and recall rate for multi-step attacks, and it can effectively correlate attack steps and obtain multiple key attack chains.
引用
收藏
页数:23
相关论文
共 40 条
  • [1] Performance Investigation of Principal Component Analysis for Intrusion Detection System Using Different Support Vector Machine Kernels
    Almaiah, Mohammed Amin
    Almomani, Omar
    Alsaaidah, Adeeb
    Al-Otaibi, Shaha
    Bani-Hani, Nabeel
    Al Hwaitat, Ahmad K.
    Al-Zahrani, Ali
    Lutfi, Abdalwali
    Awad, Ali Bani
    Aldhyani, Theyazn H. H.
    [J]. ELECTRONICS, 2022, 11 (21)
  • [2] [Anonymous], 2021, 2021 5 AS C ART INT
  • [3] [Anonymous], 2019, IEEE ICC, P1, DOI DOI 10.1109/icc.2019.8761077
  • [4] Chang LY, 2021, Arxiv, DOI arXiv:2111.13597
  • [5] Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks
    Charan, P. V. Sai
    Kumar, T. Gireesh
    Anand, P. Mohan
    [J]. EMERGING TECHNOLOGIES IN COMPUTER ENGINEERING: MICROSERVICES IN BIG DATA ANALYTICS, 2019, 985 : 45 - 54
  • [6] Cucurull G., 2017, ARXIV
  • [7] Detection of advanced persistent threat using machine-learning correlation analysis
    Ghafir, Ibrahim
    Hammoudeh, Mohammad
    Prenosil, Vaclav
    Han, Liangxiu
    Hegarty, Robert
    Rabie, Khaled
    Aparicio-Navarro, Francisco J.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 349 - 359
  • [8] Graves A, 2012, STUD COMPUT INTELL, V385, P1, DOI [10.1007/978-3-642-24797-2, 10.1162/neco.1997.9.1.1]
  • [9] Hamilton WL, 2017, ADV NEUR IN, V30
  • [10] Multi-step attack detection in industrial control systems using causal analysis
    Jadidi, Zahra
    Hagemann, Joshua
    Quevedo, Daniel
    [J]. COMPUTERS IN INDUSTRY, 2022, 142