Suppr超能文献

基于流程挖掘和图分割的分布式攻击建模方法

Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation.

作者信息

Chen Yuzhong, Liu Zhenyu, Liu Yulin, Dong Chen

机构信息

Fujian Key Laboratory of Network Computing and Intelligent Information Processing, College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350116, China.

Key Laboratory of Spatial Data Mining & Information Sharing, Ministry of Education, Fuzhou 350116, China.

出版信息

Entropy (Basel). 2020 Sep 14;22(9):1026. doi: 10.3390/e22091026.

Abstract

Attack graph modeling aims to generate attack models by investigating attack behaviors recorded in intrusion alerts raised in network security devices. Attack models can help network security administrators discover an attack strategy that intruders use to compromise the network and implement a timely response to security threats. However, the state-of-the-art algorithms for attack graph modeling are unable to obtain a high-level or global-oriented view of the attack strategy. To address the aforementioned issue, considering the similarity between attack behavior and workflow, we employ a heuristic process mining algorithm to generate the initial attack graph. Although the initial attack graphs generated by the heuristic process mining algorithm are complete, they are extremely complex for manual analysis. To improve their readability, we propose a graph segmentation algorithm to split a complex attack graph into multiple subgraphs while preserving the original structure. Furthermore, to handle massive volume alert data, we propose a distributed attack graph generation algorithm based on Hadoop MapReduce and a distributed attack graph segmentation algorithm based on Spark GraphX. Additionally, we conduct comprehensive experiments to validate the performance of the proposed algorithms. The experimental results demonstrate that the proposed algorithms achieve considerable improvement over comparative algorithms in terms of accuracy and efficiency.

摘要

攻击图建模旨在通过调查网络安全设备中产生的入侵警报所记录的攻击行为来生成攻击模型。攻击模型可以帮助网络安全管理员发现入侵者用来破坏网络的攻击策略,并对安全威胁及时做出响应。然而,用于攻击图建模的现有算法无法获得攻击策略的高级或全局视角。为了解决上述问题,考虑到攻击行为与工作流之间的相似性,我们采用启发式过程挖掘算法来生成初始攻击图。尽管启发式过程挖掘算法生成的初始攻击图是完整的,但对于人工分析来说极其复杂。为了提高其可读性,我们提出了一种图分割算法,将复杂的攻击图分割成多个子图,同时保留原始结构。此外,为了处理海量警报数据,我们提出了一种基于Hadoop MapReduce的分布式攻击图生成算法和一种基于Spark GraphX的分布式攻击图分割算法。此外,我们进行了全面的实验来验证所提出算法的性能。实验结果表明,所提出的算法在准确性和效率方面比对比算法有显著提高。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/adad/7597119/13acd516e4d1/entropy-22-01026-g001.jpg

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验