Skip to main navigation Skip to search Skip to main content

Building scenario graph using clustering

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The increasing use of Network Intrusion Detection Systems (NIDSs) and a relatively high false alert rate can lead to a huge volume of alerts. This makes it very difficult for security analysts to detect long run attacks. In this paper, we have proposed a system that represents a set of alerts as subattacks. Then correlates these subattacks and generates abstracted scenario graphs (SGs) which reflect attack scenarios. We have conducted the experiments using Snort as NIDS with different datasets that contains multistep attacks. The resulted compressed SGs imply that our method can correlate related alerts, uncover the attack strategies, and can detect new variations of attacks.

Original languageEnglish
Title of host publication2007 International Conference on Convergence Information Technology, ICCIT 2007
Pages799-804
Number of pages6
DOIs
StatePublished - 2007
Externally publishedYes
Event2nd International Conference on Convergent Information Technology, ICCIT 07 - Gyongju, Korea, Republic of
Duration: 21 Nov 200723 Nov 2007

Publication series

Name2007 International Conference on Convergence Information Technology, ICCIT 2007

Conference

Conference2nd International Conference on Convergent Information Technology, ICCIT 07
Country/TerritoryKorea, Republic of
CityGyongju
Period21/11/0723/11/07

Fingerprint

Dive into the research topics of 'Building scenario graph using clustering'. Together they form a unique fingerprint.

Cite this