Mining attack correlation scenarios based on multi-agent system

  • Authors:
  • Sisi Huang;Zhitang Li;Li Wang

  • Affiliations:
  • Computer Science Department, Huazhong University of Science and Technology, Hubei, Wuhan, China;Computer Science Department, Huazhong University of Science and Technology, Hubei, Wuhan, China;Computer Science Department, Huazhong University of Science and Technology, Hubei, Wuhan, China

  • Venue:
  • Proceedings of the 2007 conference on Human interface: Part I
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Nowadays, one very complicated problem bothering network analysts too much is the redundant data generated by IDS. The objective of our system SATA (Security Alert & Threat Analysis) is trying to solve this problem. Several novel methods using data mining technologies to reconstruct attack scenarios were proposed to predict the next stage of attacks according to the recognition the attackers' high level strategies. The main idea of this paper is to propose a novel idea of mining "complicated" attack scenarios based on multi-agent systems without the limitation of necessity of clear attack specifications and precise rule definitions. We propose SAMP and CAST to mine frequent attack behavior sequences and construct attack scenarios. We perform a series of experiments to validate our method on practical attack network environments of CERNET. The results of experiments show that our approach is valid in multi-agent attack scenario construction and correlation analysis.