Method for reconstructing network attack path based on frequent pattern-growth algorithm

A frequent pattern growth and attack path technology, applied in the field of network information security, can solve problems such as difficulty in ensuring the accuracy of results, resource consumption, and the Apriori algorithm is not suitable for mining long frequent sequences, so as to reduce system overhead and improve mining efficiency Effect

Inactive Publication Date: 2011-05-04
中国航天科技集团公司第七一0研究所 +1
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] 1. The Apriori algorithm will generate a large number of candidate sets during the mining process, which seriously consumes resources;
[0023] 2. The Apriori algorithm needs to scan the database repeatedly to mine frequent sequences of each length level, and the time complexity is high;
[0024] 3. Since the Apriori algorithm is not suitable for mining long frequent sequences, the SATA system can only mine attack sequences of no more than 10 steps, and is helpless for longer attack sequences
[0025] 4. Since the SATA system simply sorts the alarm event sequence in chronological order before mining, its mining objects are still discrete alarm events that have not been associated, resulting in the final mining results being all alarm events that meet the minimum support The simple aggregation of data cannot directly form an attack path, and the administrator needs to reprocess the data based on experience, so it is difficult to guarantee the accuracy of the results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for reconstructing network attack path based on frequent pattern-growth algorithm
  • Method for reconstructing network attack path based on frequent pattern-growth algorithm
  • Method for reconstructing network attack path based on frequent pattern-growth algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] The method of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0092] In order to test the validity of the method proposed by the present invention, a set of application system designed based on the principle of the method is used for experiments. The experimental hardware environment is a pre-built local area network, in which three hosts are configured, and the hosts are connected by a hub; the software environment is: IDS uses snort, scanner uses x-scan, and antivirus software uses Kaspersky. Randomly select a host as the attacker, and control it to attack another host as the attacked host. Anti-virus software and scanners are installed on the attacked host, and IDS is installed on the third host.

[0093] In order to simulate the real attack scenario more effectively, the background data traffic in the attack scenario is simulated using the DAPRA2000 dataset. After the experiment start...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a technology for reconstructing a network attack path based on a frequent pattern-growth algorithm, belonging to the technical field of network information safety and being suitable for an intrusion detection system (IDS) and other safety monitoring systems. In the invention, data of alarm event of the IDS and other security tools such as antivirus / scanner and the like are associated and fused into a complementary intrusion evidence so as to enable the attack per step to have a corresponding system state as objective reflection of attack effects; Bayesian network-based attack scenes are established on the basis of the data; frequent attack sequences are excavated from the attack scenes by adopting the frequent pattern-growth algorithm, thus improving the excavation efficiency and obviously reducing system expenses; and the excavated frequent attack sequences are associated once again so as to reconstruct the attack path and judge possible attack intentions clearly.

Description

technical field [0001] The invention relates to an attack path reconstruction technology based on a frequent pattern growth algorithm, belongs to the technical field of network information security, and is suitable for intrusion detection systems (IDS) and other security monitoring systems. Background technique [0002] Intrusion Detection System (IDS) detects behaviors or activities in the system that violate security policies or endanger system security by checking audit data or network packet information of the operating system, and respond according to preset policies. Since IDS provides a large number of independent and original alarm events and there are missing alarms and false alarms, these data cannot be directly used. At present, the commonly used method is to aggregate and correlate low-level alarm events to establish a high-level attack scenario, that is, to analyze a series of attack steps taken by the intruder to achieve the intrusion goal from a large number o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26G06F17/30
Inventor 王崑声白昊胡昌振
Owner 中国航天科技集团公司第七一0研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products