Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis

Author:

Hu Hao12ORCID,Liu Yuling3ORCID,Zhang Hongqi12,Zhang Yuchen12

Affiliation:

1. Information Science and Technology Institute, Zhengzhou 450001, China

2. Henan Key Laboratory of Information Security, Zhengzhou 450001, China

3. Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China

Abstract

Network security metrics allow quantitatively evaluating the overall resilience of networked systems against attacks. From this aim, security metrics are of great importance to the security-related decision-making process of enterprises. In this paper, we employ absorbing Markov chain (AMC) to estimate the network security combining with the technique of big data correlation analysis. Specifically, we construct the model of AMC using a large amount of alert data to describe the scenario of multistep attacks in the real world. In addition, we implement big data correlation analysis to generate the transition probability matrix from alert stream, which defines the probabilities of transferring from one attack action to another according to a given scenario before reaching one of some attack targets. Based on the probability reasoning, two metric algorithms are designed to estimate the attack scenario as well as the attackers, namely, the expected number of visits (ENV) and the expected success probability (ESP). The superiority is that the proposed model and algorithms assist the administrator in building new scenarios, prioritizing alerts, and ranking them.

Funder

National Key Research and Development Program of China

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Cited by 25 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT;Computer Modeling in Engineering & Sciences;2024

2. Intelligent Optimization Framework for Future Communication Networks using Machine Learning;Data and Metadata;2024-01-01

3. An Attack Scenario Reconstruction Approach Using Alerts Correlation and a Dynamic Attack Graph;2023 Eighth International Conference On Mobile And Secure Services (MobiSecServ);2023-11-04

4. Pretrained Implicit-Ensemble Transformer for Open-Set Authentication on Multimodal Mobile Biometrics;Proceedings of the 31st ACM International Conference on Multimedia;2023-10-26

5. An effective attack scenario construction model based on identification of attack steps and stages;International Journal of Information Security;2023-05-28

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3