Cyber Threat Prediction Model Using Security Monitoring System Event

作者: Neo Park , Won Hyung Park

DOI: 10.1007/978-94-007-5860-5_27

关键词:

摘要: There was a large scale of DDoS(Distributed Denial Service) attacks mostly targeted at Korean government web sites and cooperations on March 4, 2010 (3.4 DDoS attack) after 7.7 July 7, 2009 in South Korea. To detect respond to them, malwares must first be detected by security monitoring system. In particular, availability method predict such advance will lead preventing incidents. This study propose prediction based event Security Monitoring system functional configuration realize the assess model events proposed through test consisting stages learning, evaluation.

参考文章(9)
James J. Treinen, Ramakrishna Thurimella, A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures Lecture Notes in Computer Science. pp. 1- 18 ,(2006) , 10.1007/11856214_1
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Paul Ammann, Duminda Wijesekera, Saket Kaushik, Scalable, graph-based network vulnerability analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 217- 224 ,(2002) , 10.1145/586110.586140
Cynthia Phillips, Laura Painton Swiler, None, A graph-based system for network-vulnerability analysis new security paradigms workshop. pp. 71- 79 ,(1998) , 10.1145/310889.310919
Xinming Ou, Wayne F Boyer, Miles A McQueen, A scalable approach to attack graph generation Proceedings of the 13th ACM conference on Computer and communications security - CCS '06. pp. 336- 345 ,(2006) , 10.1145/1180405.1180446
Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu, Techniques and tools for analyzing intrusion alerts ACM Transactions on Information and System Security. ,vol. 7, pp. 274- 318 ,(2004) , 10.1145/996943.996947
O. Sheyner, J. Haines, S. Jha, R. Lippmann, J.M. Wing, Automated generation and analysis of attack graphs ieee symposium on security and privacy. pp. 273- 284 ,(2002) , 10.1109/SECPRI.2002.1004377
Xinzhou Qin, Wenke Lee, Statistical Causality Analysis of Infosec Alert Data recent advances in intrusion detection. pp. 73- 93 ,(2003) , 10.1007/978-3-540-45248-5_5
F. Cuppens, A. Miege, Alert correlation in a cooperative intrusion detection framework ieee symposium on security and privacy. pp. 202- 215 ,(2002) , 10.1109/SECPRI.2002.1004372