An Attribution of Cyberattack using Association Rule Mining (ARM)

被引:0
|
作者
Abu, Md Sahrom [1 ]
Ariffin, Aswami [1 ]
Selamat, Siti Rahayu [2 ]
Yusof, Robiah [2 ]
机构
[1] Cybersecur Malaysia, Malaysian Comp Emergency Response Team, Cyberjaya, Selangor De, Malaysia
[2] Univ Teknikal Malaysia Melaka, Fac Informat Technol & Commun, Durian Tunggal, Melaka, Malaysia
关键词
CTI; association rule mining; Apriori Algorithm; attribution; interestingness measures;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid development of computer networks and information technology, an attacker has taken advantage to manipulate the situation to launch a complicated cyberattack. This complicated cyberattack causes a lot of problems among the organization because it requires an effective cyberattack attribution to mitigate and reduce the infection rate. Cyber Threat Intelligence (CTI) has gain wide coverage from the media due to its capability to provide CTI feeds from various data sources that can be used for cyberattack attribution. In this paper, we study the relationship of basic Indicator of Compromise (IOC) based on a network traffic dataset from a data mining approach. This dataset is obtained using a crawler that is deployed to pull security feed from Shadowserver. Then an association analysis method using Apriori Algorithm is implemented to extract rules that can discover interesting relationship between large sets of data items. Finally, the extracted rules are evaluated over the factor of interestingness measure of support, confidence and lift to quantify the value of association rules generated with Apriori Algorithm. By implementing the Apriori Algorithm in Shadowserver dataset, we discover some association rules among several IOC which can help attribute the cyberattack.
引用
收藏
页码:352 / 358
页数:7
相关论文
共 50 条
  • [41] Exception rules in association rule mining
    Taniar, David
    Rahayu, Wenny
    Lee, Vincent
    Daly, Olena
    APPLIED MATHEMATICS AND COMPUTATION, 2008, 205 (02) : 735 - 750
  • [42] Association Rule Mining with Differential Privacy
    Zhen, Hao
    Chiou, Bo-Cheng
    Tsou, Yao-Tung
    Kuo, Sy-Yen
    Wang, Pang-Chieh
    50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2020), 2020, : 47 - 54
  • [43] A new association rule mining algorithm
    Chandra, B.
    Gaurav
    NEURAL INFORMATION PROCESSING, PART II, 2008, 4985 : 366 - 375
  • [44] Association Rule Mining and Its Application
    DUAN Yun feng
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2001, (04) : 13 - 17
  • [45] Fast Top-K association rule mining using rule generation property pruning
    Liu, Xiangyu
    Niu, Xinzheng
    Fournier-Viger, Philippe
    APPLIED INTELLIGENCE, 2021, 51 (04) : 2077 - 2093
  • [46] A hybrid model for marine accident analysis based on Bayesian Network (BN) and Association Rule Mining (ARM)
    Ozaydin, Emre
    Fiskin, Remzi
    Ugurlu, Ozkan
    Wang, Jin
    OCEAN ENGINEERING, 2022, 247
  • [47] Fast Top-K association rule mining using rule generation property pruning
    Xiangyu Liu
    Xinzheng Niu
    Philippe Fournier-Viger
    Applied Intelligence, 2021, 51 : 2077 - 2093
  • [48] Inventory Classification Using Multi-Level Association Rule Mining
    Agarwal, Reshu
    Mittal, Mandeep
    INTERNATIONAL JOURNAL OF DECISION SUPPORT SYSTEM TECHNOLOGY, 2019, 11 (02) : 1 - 12
  • [49] Ordering Policy Using Multi-Level Association Rule Mining
    Agarwal, Reshu
    Pareek, Sarla
    Sarkar, Biswajit
    Mittal, Mandeep
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEMS AND SUPPLY CHAIN MANAGEMENT, 2018, 11 (04) : 84 - 101
  • [50] An effective association rule mining scheme using a new generic basis
    Sahoo, Jayakrushna
    Das, Ashok Kumar
    Goswami, A.
    KNOWLEDGE AND INFORMATION SYSTEMS, 2015, 43 (01) : 127 - 156