Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation

Author:

Chen YuzhongORCID,Liu Zhenyu,Liu YulinORCID,Dong Chen

Abstract

Attack graph modeling aims to generate attack models by investigating attack behaviors recorded in intrusion alerts raised in network security devices. Attack models can help network security administrators discover an attack strategy that intruders use to compromise the network and implement a timely response to security threats. However, the state-of-the-art algorithms for attack graph modeling are unable to obtain a high-level or global-oriented view of the attack strategy. To address the aforementioned issue, considering the similarity between attack behavior and workflow, we employ a heuristic process mining algorithm to generate the initial attack graph. Although the initial attack graphs generated by the heuristic process mining algorithm are complete, they are extremely complex for manual analysis. To improve their readability, we propose a graph segmentation algorithm to split a complex attack graph into multiple subgraphs while preserving the original structure. Furthermore, to handle massive volume alert data, we propose a distributed attack graph generation algorithm based on Hadoop MapReduce and a distributed attack graph segmentation algorithm based on Spark GraphX. Additionally, we conduct comprehensive experiments to validate the performance of the proposed algorithms. The experimental results demonstrate that the proposed algorithms achieve considerable improvement over comparative algorithms in terms of accuracy and efficiency.

Funder

the National Natural Science Foundation of China

Publisher

MDPI AG

Subject

General Physics and Astronomy

Reference40 articles.

1. Intrusion detection alarms reduction using root cause analysis and clustering

2. Intelligent Alert Clustering Model for Network Intrusion Analysis;Siraj;Int. J. Adv. Soft Comput. Appl.,2009

3. Process Mining: Discovery Conformance and Enhancement of Business Processes;Van der Aalst,2011

4. Workflow mining: A survey of issues and approaches

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Toward scalable graph-based security analysis for cloud networks;Computer Networks;2022-04

2. Building a dataset through attack pattern modeling and analysis system;Computers & Electrical Engineering;2022-01

3. An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks;Security and Communication Networks;2021-10-31

4. SAGE: Intrusion Alert-driven Attack Graph Extractor;2021 IEEE Symposium on Visualization for Cyber Security (VizSec);2021-10

5. Alert-driven Attack Graph Generation using S-PDFA;IEEE Transactions on Dependable and Secure Computing;2021

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3