TANDI: Threat assessment of network data and information

被引:3
作者
Holsopple, Jared [1 ]
Yang, Shanchieh Jay [1 ]
Sudit, Moises [1 ]
机构
[1] Rochester Inst Technol, 83 Lomb Mem Dr, Rochester, NY 14623 USA
来源
MULTISENSOR, MULTISOURCE INFORMATIN FUSION: ARCHITECTURES, ALGORITHMS, AND APPLICATIONS 2006 | 2006年 / 6242卷
关键词
information fusion; threat assessment; impact assessment; cyber attacks;
D O I
10.1117/12.665288
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.
引用
收藏
页数:12
相关论文
共 16 条
  • [1] Detecting, tracking, and counteracting terrorist networks via hidden Markov models
    Allanach, J
    Tu, HY
    Singh, S
    Willett, P
    Pattipati, K
    [J]. 2004 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-6, 2004, : 3246 - 3257
  • [2] [Anonymous], 2002, P ACM WORKSH SCI ASP
  • [3] CHANGWEN Q, 2002, P 6 INT C SIGNAL PRO, V2, P1091
  • [4] *CISC SYST INC, 2003, NETF REP GUID APR
  • [5] DAIN O, 2001, P ACM WORKS DAT MIN
  • [6] Hall DL, 1997, P IEEE, V85, P6, DOI [10.1109/5.554205, 10.1109/ISCAS.1998.705329]
  • [7] LITTLE E, 2005, TR2005269
  • [8] Network vulnerability assessment using Bayesian networks
    Liu, Y
    Man, H
    [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 61 - 71
  • [9] LLINAS J, 2004, P 7 INT C INF FUS ST, P1218
  • [10] NOEL S, P ACSAC DEC 2004