Attack plan recognition using hidden Markov and probabilistic inference

被引:8
作者
Li, Tun [1 ,2 ]
Liu, Yutian [1 ]
Liu, Yanbing [1 ]
Xiao, Yunpeng [1 ]
Nguyen, Nang An [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Chongqing Engn Lab Internet&Informat Secur, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
Intrusion detection; Multi-stage attacks; Hidden Markov model; Probabilistic inference; Machine learning; BAYESIAN NETWORK PARAMETERS; ALERT CORRELATION; ALGORITHM; MODEL;
D O I
10.1016/j.cose.2020.101974
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems perform well with single attack phase but not complex multi-step attacks which largely reduce their reliability. Multi-stage attack plan recognition aims at inferring attack plans and predicting upcoming attacks by analyzing the causal relationship between attack phases. Recent re-search often uses machine learning to deal with attack issues. However, some problems still exist. When probabilistic inference is applied to construct a causal network, researchers fail to take temporal sequence association into consideration, which makes it difficult for the model to deal with incomplete data. While the hidden Markov model can be used to recognize an attack plan, it cannot predict multiple intents nor their probabilities. This paper proposes a probability model based on the hidden Markov model and probabilistic inference responding to malicious events at runtime. This model uses online parameter updating rules which make it better suited to the rapidly changing cyber environment. Experimental results show that this model can achieve better performance compared to only using a single method and detect attack intent in an earlier stage. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 38 条
[1]  
Abraham Subil., 2015, INT J COMPUTER NETWO, V7
[2]  
Ansarinia M, 2012, 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), P993, DOI 10.1109/ISTEL.2012.6483131
[3]   An adaptive risk management and access control framework to mitigate insider threats [J].
Baracaldo, Nathalie ;
Joshi, James .
COMPUTERS & SECURITY, 2013, 39 :237-254
[4]   A realistic graph-based alert correlation system [J].
Ben Fredj, Ouissem .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (15) :2477-2493
[5]  
Chen HH, 2016, J INF SCI ENG, V32, P995
[6]  
[陈小军 Chen Xiaojun], 2014, [计算机学报, Chinese Journal of Computers], V37, P62
[7]   A Novel Probabilistic Matching Algorithm for Multi-Stage Attack Forecasts [J].
Cheng, Bo-Chao ;
Liao, Guo-Tan ;
Huang, Chu-Chun ;
Yu, Ming-Tse .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (07) :1438-1448
[8]  
Chih-Hung Wang, 2016, International Journal of Computer and Communication Engineering, V5, P1, DOI 10.17706/ijcce.2016.5.1.1-10
[9]  
Farhadi H, 2011, ISECURE-ISC INT J IN, V3, P77
[10]   Projecting cyberattacks through variable-length Markov models [J].
Fava, Daniel S. ;
Byers, Stephen R. ;
Yang, Shanchieh Jay .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) :359-369