Cargando…
Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation
Attack graph modeling aims to generate attack models by investigating attack behaviors recorded in intrusion alerts raised in network security devices. Attack models can help network security administrators discover an attack strategy that intruders use to compromise the network and implement a time...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7597119/ https://www.ncbi.nlm.nih.gov/pubmed/33286795 http://dx.doi.org/10.3390/e22091026 |
_version_ | 1783602267214053376 |
---|---|
author | Chen, Yuzhong Liu, Zhenyu Liu, Yulin Dong, Chen |
author_facet | Chen, Yuzhong Liu, Zhenyu Liu, Yulin Dong, Chen |
author_sort | Chen, Yuzhong |
collection | PubMed |
description | Attack graph modeling aims to generate attack models by investigating attack behaviors recorded in intrusion alerts raised in network security devices. Attack models can help network security administrators discover an attack strategy that intruders use to compromise the network and implement a timely response to security threats. However, the state-of-the-art algorithms for attack graph modeling are unable to obtain a high-level or global-oriented view of the attack strategy. To address the aforementioned issue, considering the similarity between attack behavior and workflow, we employ a heuristic process mining algorithm to generate the initial attack graph. Although the initial attack graphs generated by the heuristic process mining algorithm are complete, they are extremely complex for manual analysis. To improve their readability, we propose a graph segmentation algorithm to split a complex attack graph into multiple subgraphs while preserving the original structure. Furthermore, to handle massive volume alert data, we propose a distributed attack graph generation algorithm based on Hadoop MapReduce and a distributed attack graph segmentation algorithm based on Spark GraphX. Additionally, we conduct comprehensive experiments to validate the performance of the proposed algorithms. The experimental results demonstrate that the proposed algorithms achieve considerable improvement over comparative algorithms in terms of accuracy and efficiency. |
format | Online Article Text |
id | pubmed-7597119 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-75971192020-11-09 Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation Chen, Yuzhong Liu, Zhenyu Liu, Yulin Dong, Chen Entropy (Basel) Article Attack graph modeling aims to generate attack models by investigating attack behaviors recorded in intrusion alerts raised in network security devices. Attack models can help network security administrators discover an attack strategy that intruders use to compromise the network and implement a timely response to security threats. However, the state-of-the-art algorithms for attack graph modeling are unable to obtain a high-level or global-oriented view of the attack strategy. To address the aforementioned issue, considering the similarity between attack behavior and workflow, we employ a heuristic process mining algorithm to generate the initial attack graph. Although the initial attack graphs generated by the heuristic process mining algorithm are complete, they are extremely complex for manual analysis. To improve their readability, we propose a graph segmentation algorithm to split a complex attack graph into multiple subgraphs while preserving the original structure. Furthermore, to handle massive volume alert data, we propose a distributed attack graph generation algorithm based on Hadoop MapReduce and a distributed attack graph segmentation algorithm based on Spark GraphX. Additionally, we conduct comprehensive experiments to validate the performance of the proposed algorithms. The experimental results demonstrate that the proposed algorithms achieve considerable improvement over comparative algorithms in terms of accuracy and efficiency. MDPI 2020-09-14 /pmc/articles/PMC7597119/ /pubmed/33286795 http://dx.doi.org/10.3390/e22091026 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Chen, Yuzhong Liu, Zhenyu Liu, Yulin Dong, Chen Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation |
title | Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation |
title_full | Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation |
title_fullStr | Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation |
title_full_unstemmed | Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation |
title_short | Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation |
title_sort | distributed attack modeling approach based on process mining and graph segmentation |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7597119/ https://www.ncbi.nlm.nih.gov/pubmed/33286795 http://dx.doi.org/10.3390/e22091026 |
work_keys_str_mv | AT chenyuzhong distributedattackmodelingapproachbasedonprocessminingandgraphsegmentation AT liuzhenyu distributedattackmodelingapproachbasedonprocessminingandgraphsegmentation AT liuyulin distributedattackmodelingapproachbasedonprocessminingandgraphsegmentation AT dongchen distributedattackmodelingapproachbasedonprocessminingandgraphsegmentation |