2021
DOI: 10.3390/electronics10172160
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data

Abstract: Future-oriented networking infrastructures are characterized by highly dynamic Streaming Data (SD) whose volume, speed and number of dimensions increased significantly over the past couple of years, energized by trends such as Software-Defined Networking or Artificial Intelligence. As an essential core component of network security, Intrusion Detection Systems (IDS) help to uncover malicious activity. In particular, consecutively applied alert correlation methods can aid in mining attack patterns based on the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 67 publications
0
4
0
Order By: Relevance
“…Instead of using existing datasets, we will apply UFSSOD in a real world computer network (no labeled data available) in parallel to classifiers without feature selection to examine the differences in classification results. A recently proposed method [69] might be applied to exploit and evaluate the outcome of outlier detection for novel attack pattern recognition on streaming data with and without the application of UFSSOD's feature selection.…”
Section: Discussionmentioning
confidence: 99%
“…Instead of using existing datasets, we will apply UFSSOD in a real world computer network (no labeled data available) in parallel to classifiers without feature selection to examine the differences in classification results. A recently proposed method [69] might be applied to exploit and evaluate the outcome of outlier detection for novel attack pattern recognition on streaming data with and without the application of UFSSOD's feature selection.…”
Section: Discussionmentioning
confidence: 99%
“…Correlation can be based on the similarity of events by parameters (for example, source and destination IP addresses and ports), and the scenario can be represented as a graph (Haas and Fischer, 2019;Bajtoš et al, 2020). So SOAAPR (Heigl et al, 2021) (Streaming Outlier Analysis and Attack Pattern Recognition) matches and groups alerts in streaming mode, and the resulting clusters are converted into a graphical representation. The result is an attack signature that represents the attack scenario in terms of communication behavior, cause in data features, and time sequence of associated alerts.…”
Section: Hybrid Modelsmentioning
confidence: 99%
“…• Similarity-based (SB) methods are based on the idea that similar events can have the same root cause or the same type, and the found links depend on the inherent similarity between attributes of each event (Kotenko et al, 2018a;Heigl et al, 2021). • Causal-based (CB) methods focus on the causal structure of a event sequence, when previous steps determine the ones that follow (Zegeye et al, 2018;Hossain and Xie, 2020).…”
Section: Summary Of Ai-based Security Event Correlation Modelsmentioning
confidence: 99%
See 1 more Smart Citation