Cargando…

Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation

Attack graph modeling aims to generate attack models by investigating attack behaviors recorded in intrusion alerts raised in network security devices. Attack models can help network security administrators discover an attack strategy that intruders use to compromise the network and implement a time...

Descripción completa

Detalles Bibliográficos
Autores principales: Chen, Yuzhong, Liu, Zhenyu, Liu, Yulin, Dong, Chen
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7597119/
https://www.ncbi.nlm.nih.gov/pubmed/33286795
http://dx.doi.org/10.3390/e22091026
_version_ 1783602267214053376
author Chen, Yuzhong
Liu, Zhenyu
Liu, Yulin
Dong, Chen
author_facet Chen, Yuzhong
Liu, Zhenyu
Liu, Yulin
Dong, Chen
author_sort Chen, Yuzhong
collection PubMed
description Attack graph modeling aims to generate attack models by investigating attack behaviors recorded in intrusion alerts raised in network security devices. Attack models can help network security administrators discover an attack strategy that intruders use to compromise the network and implement a timely response to security threats. However, the state-of-the-art algorithms for attack graph modeling are unable to obtain a high-level or global-oriented view of the attack strategy. To address the aforementioned issue, considering the similarity between attack behavior and workflow, we employ a heuristic process mining algorithm to generate the initial attack graph. Although the initial attack graphs generated by the heuristic process mining algorithm are complete, they are extremely complex for manual analysis. To improve their readability, we propose a graph segmentation algorithm to split a complex attack graph into multiple subgraphs while preserving the original structure. Furthermore, to handle massive volume alert data, we propose a distributed attack graph generation algorithm based on Hadoop MapReduce and a distributed attack graph segmentation algorithm based on Spark GraphX. Additionally, we conduct comprehensive experiments to validate the performance of the proposed algorithms. The experimental results demonstrate that the proposed algorithms achieve considerable improvement over comparative algorithms in terms of accuracy and efficiency.
format Online
Article
Text
id pubmed-7597119
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75971192020-11-09 Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation Chen, Yuzhong Liu, Zhenyu Liu, Yulin Dong, Chen Entropy (Basel) Article Attack graph modeling aims to generate attack models by investigating attack behaviors recorded in intrusion alerts raised in network security devices. Attack models can help network security administrators discover an attack strategy that intruders use to compromise the network and implement a timely response to security threats. However, the state-of-the-art algorithms for attack graph modeling are unable to obtain a high-level or global-oriented view of the attack strategy. To address the aforementioned issue, considering the similarity between attack behavior and workflow, we employ a heuristic process mining algorithm to generate the initial attack graph. Although the initial attack graphs generated by the heuristic process mining algorithm are complete, they are extremely complex for manual analysis. To improve their readability, we propose a graph segmentation algorithm to split a complex attack graph into multiple subgraphs while preserving the original structure. Furthermore, to handle massive volume alert data, we propose a distributed attack graph generation algorithm based on Hadoop MapReduce and a distributed attack graph segmentation algorithm based on Spark GraphX. Additionally, we conduct comprehensive experiments to validate the performance of the proposed algorithms. The experimental results demonstrate that the proposed algorithms achieve considerable improvement over comparative algorithms in terms of accuracy and efficiency. MDPI 2020-09-14 /pmc/articles/PMC7597119/ /pubmed/33286795 http://dx.doi.org/10.3390/e22091026 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Chen, Yuzhong
Liu, Zhenyu
Liu, Yulin
Dong, Chen
Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation
title Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation
title_full Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation
title_fullStr Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation
title_full_unstemmed Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation
title_short Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation
title_sort distributed attack modeling approach based on process mining and graph segmentation
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7597119/
https://www.ncbi.nlm.nih.gov/pubmed/33286795
http://dx.doi.org/10.3390/e22091026
work_keys_str_mv AT chenyuzhong distributedattackmodelingapproachbasedonprocessminingandgraphsegmentation
AT liuzhenyu distributedattackmodelingapproachbasedonprocessminingandgraphsegmentation
AT liuyulin distributedattackmodelingapproachbasedonprocessminingandgraphsegmentation
AT dongchen distributedattackmodelingapproachbasedonprocessminingandgraphsegmentation