2020
DOI: 10.3390/app10082983
|View full text |Cite
|
Sign up to set email alerts
|

Online Mining Intrusion Patterns from IDS Alerts

Abstract: The intrusion detection system (IDS) which is used widely in enterprises, has produced a large number of logs named alerts, from which the intrusion patterns can be mined. These patterns can be used to construct the intrusion scenarios or discover the final objectives of the malicious actors, and even assist the forensic works of network crimes. In this paper, a novel algorithm for the intrusion pattern mining is proposed which aimsto solve the difficult problems of the intrusion action sequence such as the lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…The technique, known as sequence pattern mining, decreases the exertion to advance pattern rules [20]. A historic attack sequence considered to be vulnerable several recent attack strategies, while making sure it utilizes the resultant database.…”
Section: Sequence Pattern Miningmentioning
confidence: 99%
“…The technique, known as sequence pattern mining, decreases the exertion to advance pattern rules [20]. A historic attack sequence considered to be vulnerable several recent attack strategies, while making sure it utilizes the resultant database.…”
Section: Sequence Pattern Miningmentioning
confidence: 99%
“…In [25], K. Zhang et al introduce the Backward Influence Factor (BIF) algorithm capable of processing and mining intrusion patterns originating from a sequence of IDS alerts. The proposed algorithm handles efficiently the sequence data analysis issues like random noise, disordering and element missing.…”
Section: Related Workmentioning
confidence: 99%
“…The evaluation results demonstrate the efficacy of the proposed framework in terms of accuracy and scalability. K. Zhang et al in [28] provide an alert correlation framework called Intrusion Action Based Correlation Framework (IACF) presenting a similar architecture as in their previous work in [25]. The proposed framework enhances the aggregation of cybersecurity alerts, the intrusion actions association, the extraction of intrusion sessions and finally the intrusion scenarios identification.…”
Section: Related Workmentioning
confidence: 99%
“…Training data of high quality is necessary to achieve the most outstanding performance of machine learning IDS; thus it must contain a mixture of abnormal and normal patterns [113,114]. Features refer to the vital information that is extracted from raw data; they are essential for classification purposes as well as detection, and they influence the effectiveness of a machine learning IDS.…”
Section: Feature Reduction (Feature Selection) Techniques For Ids On Iotmentioning
confidence: 99%