Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

An Effective Attack Scenario Construction Model based on Attack Steps and Stages Identification (2110.08662v1)

Published 16 Oct 2021 in cs.CR

Abstract: A Network Intrusion Detection System (NIDS) is a network security technology for detecting intruder attacks. However, it produces a great amount of low-level alerts which makes the analysis difficult, especially to construct the attack scenarios. Attack scenario construction (ASC) via Alert Correlation (AC) is important to reveal the strategy of attack in terms of steps and stages that need to be launched to make the attack successful. In most of the existing works, alerts are correlated by classifying the alerts based on the cause-effect relationship. However, the drawback of these works is the identification of false and incomplete correlations due to the infiltration of raw alerts. To address this problem, this work proposes an effective ASC model to discover the complete relationship among alerts. The model is successfully experimented using two types of datasets, which are DARPA 2000, and ISCX2012. The Completeness and Soundness of the proposed model are measured to evaluate the overall correlation effectiveness.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (7)
  1. Taqwa Ahmed Alhaj (1 paper)
  2. Maheyzah Md Siraj (1 paper)
  3. Anazida Zainal (1 paper)
  4. Inshirah Idris (1 paper)
  5. Anjum Nazir (2 papers)
  6. Fatin Elhaj (1 paper)
  7. Tasneem Darwish (6 papers)

Summary

We haven't generated a summary for this paper yet.