Work in Progress - Tracking Correlated Attacks in Enterprise Intranets through Lattices

Sule Simsek
{"title":"Work in Progress - Tracking Correlated Attacks in Enterprise Intranets through Lattices","authors":"Sule Simsek","doi":"10.1109/SECCOMW.2006.359570","DOIUrl":null,"url":null,"abstract":"Tracking attacks caused by correlation between malicious hosts is a rapidly growing research area. In this work-in-progress paper, we propose a lattice-based visualization method to capture the correlation between malicious hosts in an enterprise internal network. We present the design of L-BIDS (lattice-based intrusion detection system) in which the nodes represent the causal and correlated properties of the network messages. In order to track the propagation of a distributed denial of service (DDoS) attack, L-BIDS nodes are highlighted with different colors based on their role within the attack. The colored structure of nodes in an L-BIDS lattice allow us to obtain a concise intrusion signature, therefore, simplifies the tracking of the propagation of the DDoS attack. In our preliminary L-BIDS model, the analysis of the network data is off-line","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Securecomm and Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECCOMW.2006.359570","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Tracking attacks caused by correlation between malicious hosts is a rapidly growing research area. In this work-in-progress paper, we propose a lattice-based visualization method to capture the correlation between malicious hosts in an enterprise internal network. We present the design of L-BIDS (lattice-based intrusion detection system) in which the nodes represent the causal and correlated properties of the network messages. In order to track the propagation of a distributed denial of service (DDoS) attack, L-BIDS nodes are highlighted with different colors based on their role within the attack. The colored structure of nodes in an L-BIDS lattice allow us to obtain a concise intrusion signature, therefore, simplifies the tracking of the propagation of the DDoS attack. In our preliminary L-BIDS model, the analysis of the network data is off-line
正在进行的工作-通过格跟踪企业内部网中的相关攻击
由恶意主机之间的关联引起的跟踪攻击是一个快速发展的研究领域。在这篇正在进行中的论文中,我们提出了一种基于网格的可视化方法来捕获企业内部网络中恶意主机之间的相关性。提出了一种基于格子的入侵检测系统(L-BIDS),其中节点表示网络消息的因果关系和相关属性。为了跟踪分布式拒绝服务(DDoS)攻击的传播,L-BIDS节点根据它们在攻击中的角色用不同的颜色突出显示。L-BIDS格中节点的彩色结构使我们能够获得简洁的入侵签名,从而简化了对DDoS攻击传播的跟踪。在我们初步的L-BIDS模型中,网络数据的分析是离线的
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信