MAAC: Novel Alert Correlation Method To Detect Multi-step Attack

11/16/2020
by   Xiaoyu Wang, et al.
0

With the continuous improvement of attack methods, there are more and more distributed, complex, targeted attacks, and attackers use combined methods to attack. Advanced cyber attacks include multiple stages to achieve the ultimate goal. Traditional intrusion detection systems such as terminal security management tools, firewalls, and other monitoring tools will generate a large number of alerts during the attack. These alerts include attack clues, as well as many false positives unrelated to attacks. Security analysts need to analyze a large number of alerts and find useful clues from them, make correlations, and restore attack scenarios. However, most traditional security monitoring tools cannot correlate alerts from different sources, so many multi-step attacks are still completely unnoticed, requiring manual analysis by security analysts like finding a needle in a haystack. We propose MMAC, a multi-step attack alert correlation algorithm, which reduces repeated alerts and combines multi-stage attack paths based on alert semantics and attack stages. The evaluation results of the dataset and real scene show that MAAC can find and evaluate attack paths from a large number of alerts.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/24/2023

Introducing a New Alert Data Set for Multi-Step Attack Analysis

Intrusion detection systems (IDS) reinforce cyber defense by autonomousl...
research
10/16/2021

An Effective Attack Scenario Construction Model based on Attack Steps and Stages Identification

A Network Intrusion Detection System (NIDS) is a network security techno...
research
04/03/2013

Predicting Network Attacks Using Ontology-Driven Inference

Graph knowledge models and ontologies are very powerful modeling and re ...
research
03/26/2021

Multi-Stage Attack Detection via Kill Chain State Machines

Today, human security analysts collapse under the sheer volume of alerts...
research
05/09/2019

Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack

"Feint Attack", as a new type of APT attack, has become the focus of att...
research
02/07/2023

Catch Me If You Can: Improving Adversaries in Cyber-Security With Q-Learning Algorithms

The ongoing rise in cyberattacks and the lack of skilled professionals i...
research
07/07/2023

From Lemons to Peaches: Improving Security ROI through Security Chaos Engineering

Traditional information security presents a poor ROI: payoffs only manif...

Please sign up or login with your details

Forgot password? Click here to reset