An Attribution of Cyberattack using Association Rule Mining (ARM)

被引:0
|
作者
Abu, Md Sahrom [1 ]
Ariffin, Aswami [1 ]
Selamat, Siti Rahayu [2 ]
Yusof, Robiah [2 ]
机构
[1] Cybersecur Malaysia, Malaysian Comp Emergency Response Team, Cyberjaya, Selangor De, Malaysia
[2] Univ Teknikal Malaysia Melaka, Fac Informat Technol & Commun, Durian Tunggal, Melaka, Malaysia
关键词
CTI; association rule mining; Apriori Algorithm; attribution; interestingness measures;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid development of computer networks and information technology, an attacker has taken advantage to manipulate the situation to launch a complicated cyberattack. This complicated cyberattack causes a lot of problems among the organization because it requires an effective cyberattack attribution to mitigate and reduce the infection rate. Cyber Threat Intelligence (CTI) has gain wide coverage from the media due to its capability to provide CTI feeds from various data sources that can be used for cyberattack attribution. In this paper, we study the relationship of basic Indicator of Compromise (IOC) based on a network traffic dataset from a data mining approach. This dataset is obtained using a crawler that is deployed to pull security feed from Shadowserver. Then an association analysis method using Apriori Algorithm is implemented to extract rules that can discover interesting relationship between large sets of data items. Finally, the extracted rules are evaluated over the factor of interestingness measure of support, confidence and lift to quantify the value of association rules generated with Apriori Algorithm. By implementing the Apriori Algorithm in Shadowserver dataset, we discover some association rules among several IOC which can help attribute the cyberattack.
引用
收藏
页码:352 / 358
页数:7
相关论文
共 50 条
  • [1] An attribution of cyberattack using association rule mining (ARM)
    Abu M.S.
    Ariffin A.
    Selamat S.R.
    Yusof R.
    Intl. J. Adv. Comput. Sci. Appl., 2020, 2 (352-358): : 352 - 358
  • [2] Formulation of Association Rule Mining (ARM) for an Effective Cyber Attack Attribution in Cyber Threat Intelligence (CTI)
    Abu, Md Sahrom
    Ariffin, Aswami
    Selamat, Siti Rahayu
    Yusof, Robiah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (04) : 134 - 143
  • [3] Association rule mining using binary particle swarm optimization
    Sarath, K. N. V. D.
    Ravi, Vadlamani
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2013, 26 (08) : 1832 - 1840
  • [4] Leveraging bibliographic RDF data for keyword prediction with Association Rule Mining (ARM)
    Kushwaha, Nidhi
    Vyas, O.P.
    1600, Committee on Data for Science and Technology (13): : 119 - 126
  • [5] MAD-ARM: Mobile Agent based Distributed Association Rule Mining
    Raja, A. Saleem
    Raj, E. George Dharma Prakash
    2013 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS, 2013,
  • [6] A Novel Web Fraud Detection Technique using Association Rule Mining
    Tripathi, Diwakar
    Nigam, Bhawana
    Edla, Damodar Reddy
    7TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2017), 2017, 115 : 274 - 281
  • [7] Binary Association Rule Mining Using Bayesian Network
    Vedula, Venkateswara Rao
    Thatavarti, Satish
    INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 171 - 176
  • [8] Dynamic association rule mining using Genetic Algorithms
    Shenoy, P. Deepa
    Srinivasa, K. G.
    Venugopal, K. R.
    Patnaik, Lalit M.
    INTELLIGENT DATA ANALYSIS, 2005, 9 (05) : 439 - 453
  • [9] Strategic aspects of cyberattack, attribution, and blame
    Edwards, Benjamin
    Furnas, Alexander
    Forrest, Stephanie
    Axelrod, Robert
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2017, 114 (11) : 2825 - 2830
  • [10] Using association rule mining to identify risk factors for early childhood caries
    Ivancevic, Vladimir
    Tusek, Ivan
    Tusek, Jasmina
    Knezevic, Marko
    Elheshk, Salaheddin
    Lukovic, Ivan
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2015, 122 (02) : 175 - 181