Universiti Teknologi Malaysia Institutional Repository

An effective attack scenario construction model based on identification of attack steps and stages.

Alhaj, Taqwa Ahmed and Md. Siraj, Maheyzah and Zainal, Anazida and Idris, Inshirah and Nazir, Anjum and Elhaj, Fatin and Darwish, Tasneem (2023) An effective attack scenario construction model based on identification of attack steps and stages. International Journal of Information Security, 22 (5). pp. 1481-1496. ISSN 1615-5262

Full text not available from this repository.

Official URL: http://dx.doi.org/10.1007/s10207-023-00701-2

Abstract

A Network Intrusion Detection System is a network security technology for detecting intruder attacks. However, it produces a great amount of low-level alerts which makes the analysis difficult, especially to construct the attack scenarios. Attack scenario construction (ASC) via Alert Correlation is important to reveal the strategy of attack in terms of steps and stages that need to be launched to make the attack successful. In most of the existing works, alerts are correlated by classifying the alerts based on the cause-effect relationship. However, the drawback of these works is the identification of false and incomplete correlations due to infiltration of raw alerts. To address this problem, this work proposes an effective ASC model to discover the complete relationship among alerts. The model is successfully experimented using two types of dataset, which are DARPA 2000, and ISCX2012. The Completeness and Soundness of the proposed model are measured to evaluate the overall correlation effectiveness.

Item Type:Article
Uncontrolled Keywords:Alerts; Attack scenario; IDS.
Subjects:T Technology > T Technology (General)
T Technology > T Technology (General) > T58.5-58.64 Information technology
Divisions:Computing
ID Code:105712
Deposited By: Muhamad Idham Sulong
Deposited On:12 May 2024 06:08
Last Modified:12 May 2024 06:08

Repository Staff Only: item control page