Method for reconstructing network attack path based on frequent pattern-growth algorithm

A frequent pattern growth and attack path technology, applied in the field of network information security, can solve the problems of resource consumption, difficulty in ensuring the accuracy of results, and the Apriori algorithm is not suitable for mining long frequent sequences, so as to improve mining efficiency and reduce system overhead Effect

Inactive Publication Date: 2010-12-29
中国航天科技集团公司第七一0研究所 +1
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] 1. The Apriori algorithm will generate a large number of candidate sets during the mining process, which seriously consumes resources;
[0023] 2. The Apriori algorithm needs to scan the database repeatedly to mine frequent sequences of each length level, and the time complexity is high;
[0024] 3. Since the Apriori algorithm is not suitable for mining long frequent sequences, the SATA system can only mine attack sequences of no more than 10 steps, and is helpless for longer attack sequences
[0025] 4. Since the SATA system simply sorts the alarm event sequence in chronological order before mining, its mining objects are still discrete alarm events that have not been associated, resulting in the final mining results being all alarm events that meet the minimum support The simple aggregation of data cannot directly form an attack path, and the administrator needs to reprocess the data based on experience, so it is difficult to guarantee the accuracy of the results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for reconstructing network attack path based on frequent pattern-growth algorithm
  • Method for reconstructing network attack path based on frequent pattern-growth algorithm
  • Method for reconstructing network attack path based on frequent pattern-growth algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] The method of the present invention will be described in detail below with reference to the drawings and specific implementations.

[0092] In order to test the effectiveness of the method proposed by the present invention, an application system designed based on the principle of the method is used for experiments. The experimental hardware environment is a pre-built LAN, in which three hosts are configured, and the hosts are connected by a hub; the software environment is: IDS uses snort, scanner uses x-scan, and antivirus software uses Kaspersky. Randomly select a host as the attacker and control it to attack another host as the attacked. Antivirus software and scanner are installed on the attacked host, and IDS is installed on the third host.

[0093] In order to simulate the real attack scenario more effectively, the DAPRA2000 data set is used to simulate the background data traffic in the attack scenario. After the experiment started, the system collected 267 alarm eve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a technology for reconstructing a network attack path based on a frequent pattern-growth algorithm, belonging to the technical field of network information safety and being suitable for an intrusion detection system (IDS) and other safety monitoring systems. In the invention, data of alarm event of the IDS and other security tools such as antivirus / scanner and the like are associated and fused into a complementary intrusion evidence so as to enable the attack per step to have a corresponding system state as objective reflection of attack effects; Bayesian network-based attack scenes are established on the basis of the data; frequent attack sequences are excavated from the attack scenes by adopting the frequent pattern-growth algorithm, thus improving the excavation efficiency and obviously reducing system expenses; and the excavated frequent attack sequences are associated once again so as to reconstruct the attack path and judge possible attack intentions clearly.

Description

Technical field [0001] The invention relates to an attack path reconstruction technology based on a frequent pattern growth algorithm, which belongs to the technical field of network information security and is suitable for intrusion detection systems (IDS) and other security monitoring systems. Background technique [0002] The intrusion detection system (IDS) detects the behavior or activity that violates the security policy or endangers the security of the system by checking the audit data of the operating system or the network data packet information, and responds according to the preset policy. Because IDS provides a large number of independent and original alarm events and there are missing and false alarms, these data cannot be used directly. At present, the commonly used method is to gather and correlate low-level alarm events to establish high-level attack scenarios, that is, to analyze a series of attack steps taken by the intruder to achieve the intrusion goal from a l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26G06F17/30
Inventor 王崑声白昊胡昌振
Owner 中国航天科技集团公司第七一0研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products