Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey
Abstract
:1. Introduction
- State of the art intrusion alert prediction methods.
- Presenting a classification and comparison of alert correlation approaches.
- State of the art intrusion alert datasets, which are not considered in the existing surveys.
2. State-of-the-Art Intrusion Alert Prediction Models
2.1. Plan Library
2.2. Network Attack Graph
2.3. Sequence Pattern Mining
2.4. Machine Learning and Data Mining
2.5. Relational Time Series
2.6. Bayesian Network
2.7. Deep Learning
3. Taxonomy
3.1. Similarity-Based Approach
- Similarity-based on Hierarchal Rules—The Hierarchal Rule similarity-based algorithm defined similarity measures in a generalized hierarchical concept. It has been defined as a similarity that works on the basis of root cause analysis to detect root causes in networks [41,42]. The root of cause of similar alerts are same to the root cause of hierarchy.
- Similarity-based on Machine Learning—The similarity measures are generated automatically. The pre-requisite for supervised algorithms characterizes the existence of clustered alerts, which is set by the machine-learning algorithms. Algorithms, without this requirement (unsupervised), require training to measure the similarity between alerts. A neural network used to perform clustering based on alert reconstruction error [5,27,43,44]. It is a one-step process of clustering and decision-making based on cluster statistics. The online learning capability applies false and true alert patterns on the basis of labeled data.
3.2. Knowledge-Based Approach
- Scenario—The principle utilization of scenario-based or pre-defined scenario approaches is to predict the multi-step attacks, as a real attack consists of a sequence of steps [27,45]. An attack scenario is defined by its relating steps or stages, which are required to succeed. Different attack scenario modeling languages are presented, such as [19,27,45,46,47], However the main idea in all of them is to define the stages and preconditions of an attack, as well as its goals based on the rules stored in the knowledge base, which specifies that the stages of the attack are necessary to achieve success. The knowledge rules are constructs either by machine learning or manually by experts. However, the correlation rules in machine learning approaches are obtained using the training stage and labeled data.
- Prerequisites/Consequences—These methodologies observe and control implications of alerts and existing knowledge in the network and then detect/predict the security event. If some post-conditions of the first alert match some pre-conditions of the next alert, then the two alerts can be logically correlated. However, a complete scenario description is not required here.One of the first algorithms to use background knowledge has been proposed by [48]. They used provides/requires a model for describing causal relationships between alerts using JIGSAW language. However, it can only detect known attacks. Attack scenarios are modeled in terms of concept and capabilities. Concepts are an abstraction of attacks, and functionality is a mandatory and provided condition associated with each attack concept. The correlation task runs when a match is found between the conditions of two temporally ordered alerts. Therefore, each alert received is modeled into a concept with the relevant required and provided capabilities. It does not represent the attack scenario as a set of states, but as a set of concepts and capabilities.
3.3. Statistical-Based Approach
- Statistical traffic estimation—the main application of this estimation is to detect alerts, which are regularly repeated to find their repetition pattern. The patterns of occurred alerts are recognized, and the repetition pattern is derived based on the statistical data of each alert and detects the dissimilarity with these patterns in the future [51,52].
- Reliability degree combination—the Reliability Degree Combination is responsible for combining reliability with the similar alerts [55,56]. Changing the reliability to alerts is proposed based on equivalent alert repetitions. This combination aims to change the priority or severity of an alert based on the other resources. The presented algorithms require a large amount of labeled previous data for generating the probability models.
3.4. Hybrid-Based Approach
3.5. Comparison of Alert Correlation Approaches
4. Generalized Components in Intrusion Alert Correlation Models
4.1. Alert Normalization/Formatting
4.2. Alert Reduction
- Alert aggregation:
- 2.
- Alert filtration—technically, false positives alerts are normally caused by runtime limitations, specificity of detection signature, and environment dependency.
4.3. Alert Severity/Prioritization
4.4. Attack Prediction and Construction
5. Intrusion Alerts Datasets
- Data privacy—realistic data are not allowed to be shared among users due to security policies, sensitivities of realistic data, lack of trust, and risk of disclosing digital information.
- Getting approval from data owner—some data owners require approval to obtain access to the dataset, and this approval process is frequently delayed.
- The scope of evaluative datasets—most publicly available datasets become out of date and unsuitable for making strong scientific claims because of variability in network segments.
- Different research objectives—the aims and methods of studies are factors that influence the choice of datasets.
- Data labeling—some available datasets are manually labeled datasets, while some are packet traces without identifiers, which influences the validity of the datasets.
- Source of evaluating datasets—there are three conceivable approaches to making more reasonable datasets for assessing the alert correlation researches to limit the effect of challenges. The datasets can be extracted from any of the general population (for example, DARPA), local area systems, and genuine systems (Koyto2006+), as shown in Figure 4.
- Alert sharing platform (SABU) dataset: This dataset was recently published as the first intrusion alert dataset; it contains intrusion alerts collected from heterogeneous intrusion detection systems in different organizations [80]. Alerts are formatted in the (IDEA) format and classified using the eCSIRT.net taxonomy. The IDEA format, as shown in Figure 4, is a descriptive data model that uses a modern JSON structure. Nearly 12 million alerts have been collected in three organization from different data sources (34 IDS, honeypots, and other data sources). This dataset has been used in significant research to test alert correlation and prediction models [3,30,81,82].
- DARPA 2000 datasets: The DARPA-2000 dataset is among the notable datasets, which are utilized to assess alert correlation research. The datasets are made by the Lincoln Lab, Massachusetts Institute of Technology (MIT) USA [76]. This dataset comprises two multi-stage scenarios, called LLDDOS 1.0 (Scenario One) and LLDDOS 2.0.2 (Scenario Two). Both attack scenarios contain a progression of attack activities to start distributed denial of service assaults (DDoS). A significant number of investigations have been made into this dataset to test the alerts correlation frameworks [20,26,44,57].
- KDD: The KDD 99 Dataset is created on basis of the data captured in DARPA’98 IDS evaluation program and used for the evaluation of Alerts Correlation researches [83]. KDD 99 network traffic consists of 41 features and is labeled as either an attack activity or normal activity. The attacks are categories as user to root attack (U2R), denial of service attack (DoS), remote to local attack (R2L), and probing attack.
- Datasets from Real Networks: The second approach is to deal with more sensible datasets from genuine networks, which are a great source of real events. Such datasets, as a rule, require endorsement from administrators of the networks.
- KYOTO2006+: The Kyoto 2006+ is datasets that have been used for evaluating Alerts Correlation researches [79]. These datasets were created from real network traffic from Nov 2006 to Aug 2009, without human intervention at the University of Kyoto, Japan. They consist of 24 statistical features where 14 conventional features are extracted based on KDD99 datasets and 10 additional features. These feature assist in investigating the happenings within the network.
6. Discussion and Future Research Direction
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Bhatti, D.G.; Virparia, P.V. Soft Computing-Based Intrusion Detection System with Reduced False Positive Rate. In Design and Analysis of Security Protocol for Communication; Wiley Online Library: Hoboken, NJ, USA, 2020; pp. 109–139. [Google Scholar]
- Thudumu, S.; Branch, P.; Jin, J.; Singh, J.J. A comprehensive survey of anomaly detection techniques for high dimensional big data. J. Big Data 2020, 7, 1–30. [Google Scholar] [CrossRef]
- Ansari, M.S.; Bartos, V.; Lee, B. Shallow and Deep Learning Approaches for Network Intrusion Alert Prediction. Procedia Comput. Sci. 2020, 171, 644–653. [Google Scholar] [CrossRef]
- Puthran, S.; Shah, K. Intrusion detection using data mining. Int. J. Comput. Intell. Stud. 2020, 9, 292–306. [Google Scholar] [CrossRef]
- Ayub, M.A.; Johnson, W.A.; Talbert, D.A.; Siraj, A. Model evasion attack on intrusion detection systems using adversarial machine learning. In Proceedings of the 2020 54th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 18–20 March 2020; pp. 1–6. [Google Scholar]
- Kalnoor, G.; Gowri Shankar, S. A Model-Based System for Intrusion Detection Using Novel Technique-Hidden Markov Bayesian in Wireless Sensor Network. In Information and Communication Technology for Competitive Strategies (ICTCS 2020); Springer: Singapore, 2022; pp. 43–53. [Google Scholar]
- Negi, P.S.; Garg, A.; Lal, R. Intrusion detection and prevention using honeypot network for cloud security. In Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 29–31 January 2020; pp. 129–132. [Google Scholar]
- Jain, V.; Agrawal, M. Applying genetic algorithm in intrusion detection system of iot applications. In Proceedings of the 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), Tirunelveli, India, 15–17 June 2020; pp. 284–287. [Google Scholar]
- Masdari, M.; Khezri, H. A survey and taxonomy of the fuzzy signature-based intrusion detection systems. Appl. Soft Comput. 2020, 92, 106301. [Google Scholar] [CrossRef]
- Gamage, S.; Samarabandu, J. Deep learning methods in network intrusion detection: A survey and an objective comparison. J. Netw. Comput. Appl. 2020, 169, 102767. [Google Scholar] [CrossRef]
- Chou, D.; Jiang, M. A Survey on Data-driven Network Intrusion Detection. ACM Comput. Surv. (CSUR) 2021, 54, 1–36. [Google Scholar] [CrossRef]
- Ahmed, N. Intrusion Detection System: A Survey and Taxonomy; HAL Open Science: Lyon, France, 2021. [Google Scholar]
- Yu Beng, L.; Ramadass, S.; Manickam, S.; Soo Fun, T. A survey of intrusion alert correlation and its design considerations. IETE Tech. Rev. 2014, 31, 233–240. [Google Scholar] [CrossRef]
- Salah, S.; Maciá-Fernández, G.; Díaz-Verdejo, J.E. A model-based survey of alert correlation techniques. Comput. Netw. 2013, 57, 1289–1317. [Google Scholar] [CrossRef]
- Sadoddin, R.; Ghorbani, A. Alert correlation survey: Framework and techniques. In Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap between PST Technologies and Business Services, Markham, ON, Canada, 30 October–1 November 2006; pp. 1–10. [Google Scholar]
- Mirheidari, S.A.; Arshad, S.; Jalili, R. Alert correlation algorithms: A survey and taxonomy. In Proceedings of the International Symposium on Cyberspace Safety and Security, Zhangjiajie, China, 13–15 November 2013; pp. 183–197. [Google Scholar]
- Li, T.; Liu, Y.; Liu, Y.; Xiao, Y.; Nguyen, N.A. Attack plan recognition using hidden Markov and probabilistic inference. Comput. Secur. 2020, 97, 101974. [Google Scholar] [CrossRef]
- Geib, C.W.; Goldman, R.P. Plan recognition in intrusion detection systems. In Proceedings of the Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX’01, Anaheim, CA, USA, 12–14 June 2001; pp. 46–55. [Google Scholar]
- Hu, H.; Liu, J.; Zhang, Y.; Liu, Y.; Xu, X.; Huang, J. Attack scenario reconstruction approach using attack graph and alert data mining. J. Inf. Secur. Appl. 2020, 54, 102522. [Google Scholar] [CrossRef]
- Zhang, K.; Luo, S.; Xin, Y.; Zhu, H.; Chen, Y. Online Mining Intrusion Patterns from IDS Alerts. Appl. Sci. 2020, 10, 2983. [Google Scholar] [CrossRef]
- Zhang, A.-F.; Li, Z.-T.; Li, D.; Wang, L. Discovering novel multistage attack patterns in alert streams. In Proceedings of the 2007 International Conference on Networking, Architecture, and Storage (NAS 2007), Guilin, China, 29–31 July 2007; pp. 115–121. [Google Scholar]
- Mahdavi, E.; Fanian, A.; Amini, F. A real-time alert correlation method based on code-books for intrusion detection systems. Comput. Secur. 2020, 89, 101661. [Google Scholar] [CrossRef]
- Cheng, Q.; Wu, C.; Zhou, S. Discovering Attack Scenarios via Intrusion Alert Correlation Using Graph Convolutional Networks. IEEE Commun. Lett. 2021, 25, 1564–1567. [Google Scholar] [CrossRef]
- Cipriano, C.; Zand, A.; Houmansadr, A.; Kruegel, C.; Vigna, G. Nexat: A history-based approach to predict attacker actions. In Proceedings of the 27th Annual Computer Security Applications Conference, Orlando, FL, USA, 5–9 December 2011; pp. 383–392. [Google Scholar]
- Tan, T.K.; Darken, C.J. Learning and prediction of relational time series. Comput. Math. Organ. Theory 2015, 21, 210–241. [Google Scholar] [CrossRef]
- Kavousi, F.; Akbari, B. A Bayesian network-based approach for learning attack strategies from intrusion alerts. Secur. Commun. Netw. 2014, 7, 833–853. [Google Scholar] [CrossRef]
- Liu, J.; Liu, B.; Zhang, R.; Wang, C. Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph. In Proceedings of the International Conference on Artificial Intelligence and Security, New York, NY, USA, 26–28 July 2019; pp. 62–74. [Google Scholar]
- Wang, Z. The applications of deep learning on traffic identification. BlackHat USA 2015, 24, 1–10. [Google Scholar]
- Chandra, B.; Sharma, R.K. Exploring autoencoders for unsupervised feature selection. In Proceedings of the 2015 International Joint Conference on Neural Networks (IJCNN), Killarney, Ireland, 12–16 July 2015; pp. 1–6. [Google Scholar]
- Ansari, M.S.; Bartoš, V.; Lee, B. GRU-based deep learning approach for network intrusion alert prediction. Future Gener. Comput. Syst. 2022, 128, 235–247. [Google Scholar] [CrossRef]
- Bartos, V.; Zadnik, M.; Habib, S.M.; Vasilomanolakis, E. Network entity characterization and attack prediction. Future Gener. Comput. Syst. 2019, 97, 674–686. [Google Scholar] [CrossRef] [Green Version]
- Chintabathina, S.; Villacis, J.; Walker, J.J.; Gomez, H.R. Plan recognition in intrusion detection systems using logic programming. In Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 13–15 November 2012; pp. 609–613. [Google Scholar]
- Wu, M.; Moon, Y.B. Alert correlation for detecting cyber-manufacturing attacks and intrusions. J. Comput. Inf. Sci. Eng. 2020, 20, 011004. [Google Scholar] [CrossRef]
- Shin, Y.; Lim, C.; Park, M.; Cho, S.; Han, I.; Oh, H.; Lee, K. Alert correlation using diamond model for cyber threat intelligence. In Proceedings of the European Conference on Cyber Warfare and Security, Coimbra, Portugal, 4–5 July 2019; Academic Conferences International Limited: Oxfordshire, UK, 2019; pp. 444–450. [Google Scholar]
- Wang, W.; Jiang, R.; Jia, Y.; Li, A.; Chen, Y. KGBIAC: Knowledge graph based intelligent alert correlation framework. In Proceedings of the International Symposium on Cyberspace Safety and Security, Xi’an, China, 23–25 October 2017; pp. 523–530. [Google Scholar]
- Siraj, M.M.; Albasheer, H.H.T.; Din, M.M. Towards predictive real-time multi-sensors intrusion alert correlation framework. Indian J. Sci. Technol. 2015, 8, 1. [Google Scholar] [CrossRef]
- Siraj, M.M.; Maarof, M.A.; Hashim, S.Z.M. Intelligent alert clustering model for network intrusion analysis. Int. J. Adv. Soft Comput. Appl. 2009, 1, 1–16. [Google Scholar]
- Cuppens, F. Managing alerts in a multi-intrusion detection environment. In Proceedings of the Seventeenth Annual Computer Security Applications Conference, New Orleans, LA, USA, 10–14 December 2001; pp. 22–31. [Google Scholar]
- Valdes, A.; Skinner, K. Probabilistic alert correlation. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection, Davis, CA, USA, 10–12 October 2001; pp. 54–68. [Google Scholar]
- Elshoush, H.T.; Osman, I.M. Intrusion alert correlation framework: An innovative approach. In IAENG Transactions on Engineering Technologies; Springer: Dordrecht, The Netherlands, 2013; pp. 405–420. [Google Scholar]
- Julisch, K. Clustering intrusion detection alarms to support root cause analysis. ACM Trans. Inf. Syst. Secur. (TISSEC) 2003, 6, 443–471. [Google Scholar] [CrossRef]
- Al-Mamory, S.O.; Zhang, H. Ids alerts correlation using grammar-based approach. J. Comput. Virol. 2009, 5, 271–282. [Google Scholar] [CrossRef]
- Dain, O.; Cunningham, R.K. Fusing a heterogeneous alert stream into scenarios. In Applications of Data Mining in Computer Security; Springer: Boston, MA, USA, 2002; pp. 103–122. [Google Scholar]
- Smith, R.; Japkowicz, N.; Dondo, M.; Mason, P. Using unsupervised learning for network alert correlation. In Proceedings of the Conference of the Canadian Society for Computational Studies of Intelligence, Windsor, ON, Canada, 28–30 May 2008; pp. 308–319. [Google Scholar]
- Cheung, S.; Lindqvist, U.; Fong, M.W. Modeling multistep cyber attacks for scenario recognition. In Proceedings of the Proceedings DARPA Information Survivability Conference and Exposition, Washington, DC, USA, 22–24 April 2003; pp. 284–292. [Google Scholar]
- Kovačević, I.; Groš, S.; Slovenec, K. Systematic Review and Quantitative Comparison of Cyberattack Scenario Detection and Projection. Electronics 2020, 9, 1722. [Google Scholar] [CrossRef]
- Zali, Z.; Hashemi, M.R.; Saidi, H. Real-time attack scenario detection via intrusion detection alert correlation. In Proceedings of the 2012 9th International ISC Conference on Information Security and Cryptology, Tabriz, Iran, 13–14 September 2012; pp. 95–102. [Google Scholar]
- Templeton, S.J.; Levitt, K. A requires/provides model for computer attacks. In Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Ireland, 18–21 September 2000; pp. 31–38. [Google Scholar]
- Ning, P.; Cui, Y.; Reeves, D.S.; Xu, D. Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. (TISSEC) 2004, 7, 274–318. [Google Scholar] [CrossRef]
- Zhu, B.; Ghorbani, A.A. Alert correlation for extracting attack strategies. Int. J. Netw. Secur. 2006, 3, 244–258. [Google Scholar]
- Viinikka, J.; Debar, H.; Me, L.; Lehikoinen, A.; Tarvainen, M. Processing intrusion detection alert aggregates with time series modeling. Inf. Fusion 2009, 10, 312–324. [Google Scholar] [CrossRef]
- Melo, R.V.; de Macedo, D.D.; Kreutz, D.; De Benedictis, A.; Fiorenza, M.M. ISM-AC: An immune security model based on alert correlation and software-defined networking. Int. J. Inf. Secur. 2021, 1–15. [Google Scholar] [CrossRef]
- Ning, P.; Xu, D.; Healey, C.G.; Amant, R.S. Building Attack Scenarios through Integration of Complementary Alert Correlation Method. In Proceedings of the NDSS, San Diego, CA, USA, 5 February 2004; pp. 97–111. [Google Scholar]
- Yang, J.; Zhang, Q.; Jiang, X.; Chen, S.; Yang, F. Poirot: Causal Correlation Aided Semantic Analysis for Advanced Persistent Threat Detection. IEEE Trans. Dependable Secur. Comput. 2021. [Google Scholar] [CrossRef]
- Alsubhi, K.; Al-Shaer, E.; Boutaba, R. Alert prioritization in intrusion detection systems. In Proceedings of the NOMS 2008—2008 IEEE Network Operations and Management Symposium, Salvador, Brazil, 7–11 April 2008; pp. 33–40. [Google Scholar]
- Asharf, J.; Moustafa, N.; Khurshid, H.; Debie, E.; Haider, W.; Wahab, A. A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions. Electronics 2020, 9, 1177. [Google Scholar] [CrossRef]
- Siraj, M.M.; Maarof, M.A.; Hashim, S.Z.M. Classifying security alerts from multiple sensors based on hybrid approach. In Proceedings of the International Conference on Informatics & Applications, Kuala Terengganu, Malaysia, 3–5 June 2012; pp. 174–181. [Google Scholar]
- Chadza, T.; Kyriakopoulos, K.G.; Lambotharan, S. Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks. Future Gener. Comput. Syst. 2020, 108, 636–649. [Google Scholar] [CrossRef]
- Debar, H.; Wespi, A. Aggregation and correlation of intrusion-detection alerts. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection, Davis, CA, USA, 10–12 October 2001; pp. 85–103. [Google Scholar]
- Kácha, P. Idea: Security event taxonomy mapping. In Proceedings of the 18th International Conference on Circuits, Systems, Communications and Computers, Santorini Island, Greece, 17–21 July 2014. [Google Scholar]
- Roschke, S.; Cheng, F.; Meinel, C. A new alert correlation algorithm based on attack graph. In Computational Intelligence in Security for Information Systems; Springer: Berlin/Heidelberg, Germany, 2011; pp. 58–67. [Google Scholar]
- Man, D.; Yang, W.; Wang, W.; Xuan, S. An alert aggregation algorithm based on iterative self-organization. Procedia Eng. 2012, 29, 3033–3038. [Google Scholar] [CrossRef] [Green Version]
- Spathoulas, G.P.; Katsikas, S.K. Enhancing IDS performance through comprehensive alert post-processing. Comput. Secur. 2013, 37, 176–196. [Google Scholar] [CrossRef]
- Nguyen, T.H.; Luo, J.; Njogu, H.W. An efficient approach to reduce alerts generated by multiple IDS products. Int. J. Netw. Manag. 2014, 24, 153–180. [Google Scholar] [CrossRef]
- Sadighian, A.; Fernandez, J.M.; Lemay, A.; Zargar, S.T. Ontids: A highly flexible context-aware and ontology-based alert correlation framework. In Proceedings of the International Symposium on Foundations and Practice of Security, La Rochelle, France, 21–22 October 2013; pp. 161–177. [Google Scholar]
- Zomlot, L.; Chandran, S.; Caragea, D.; Ou, X. Aiding intrusion analysis using machine learning. In Proceedings of the 2013 12th International Conference on Machine Learning and Applications, Miami, FL, USA, 4–7 December 2013; pp. 40–47. [Google Scholar]
- Long, J.; Schwartz, D.; Stoecklin, S. Distinguishing false from true alerts in snort by data mining patterns of alerts. In Proceedings of the Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, Orlando, FL, USA, 18 April 2006; International Society for Optics and Photonics: Bellingham, WA, USA, 2006; p. 62410B. [Google Scholar]
- Maggi, F.; Zanero, S. On the use of different statistical tests for alert correlation–short paper. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection, Gold Goast, Australia, 5–7 September 2007; pp. 167–177. [Google Scholar]
- Huang, C.-J.; Hu, K.-W.; Cheng, H.; Chang, T.-K.; Luo, Y.-C.; Lien, Y.-J. Application of type-2 fuzzy logic to rule-based intrusion alert correlation detection. Int. J. Innov. Comput. Inf. Control 2012, 8, 2865–2874. [Google Scholar]
- Hassan, M.M.M.; Baruah, H.K. Fuzzy classifier for ids alerts using genetic algorithm. Int. J. Res. 2014, 2, 228–238. [Google Scholar]
- Ghorbani, A.A.; Lu, W.; Tavallaee, M. Alert management and correlation. In Network Intrusion Detection and Prevention; Springer: Boston, MA, USA, 2010; pp. 129–160. [Google Scholar]
- Siraj, M.M.; Maarof, M.A.; Hashim, S.Z.M. A hybrid intelligent approach for automated alert clustering and filtering in intrusion alert analysis. Int. J. Comput. Theory Eng. 2009, 1, 539. [Google Scholar] [CrossRef] [Green Version]
- Nehinbe, J.O. A critical evaluation of datasets for investigating IDSs and IPSs researches. In Proceedings of the 2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS), London, UK, 1–2 September 2011; pp. 92–97. [Google Scholar]
- Thakkar, A.; Lohiya, R. A review of the advancement in intrusion detection datasets. Procedia Comput. Sci. 2020, 167, 636–645. [Google Scholar] [CrossRef]
- UCI KDD University of California. KDD Cup 99 Dataset. 1999. Available online: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed on 15 October 2021).
- MIT. MIT Lincoln Laboratory, D.I.D.E. DARPA Intrusion Detection. 2000. Available online: https://archive.ll.mit.edu/ideval/data/2000data.html (accessed on 15 October 2021).
- Lippmann, R.; Haines, J.W.; Fried, D.J.; Korba, J.; Das, K. The 1999 DARPA off-line intrusion detection evaluation. Comput. Netw. 2000, 34, 579–595. [Google Scholar] [CrossRef]
- Kyoto University’s. Traffic Data from Kyoto University’s Honeypots. 2006. Available online: https://www.takakura.com/Kyoto_data/ (accessed on 15 October 2021).
- Song, J.; Takakura, H.; Okabe, Y.; Eto, M.; Inoue, D.; Nakao, K. Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Salzburg, Austria, 10 April 2011; pp. 29–36. [Google Scholar]
- Husák, M.; Žádník, M.; Bartoš, V.; Sokol, P. Dataset of intrusion detection alerts from a sharing platform. Data Brief 2020, 33, 106530. [Google Scholar] [CrossRef]
- Pekarčík, P.; Gajdoš, A.; Sokol, P. Forecasting Security Alerts Based on Time Series. In Proceedings of the International Conference on Hybrid Artificial Intelligence Systems, Gijón, Spain, 11–13 November 2020; pp. 546–557. [Google Scholar]
- Husák, M.; Čeleda, P. Predictions of Network Attacks in Collaborative Environment. In Proceedings of the NOMS 2020—2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 20–24 April 2020; pp. 1–6. [Google Scholar]
- Sallay, H.; Ammar, A.; Saad, M.B.; Bourouis, S. A real time adaptive intrusion detection alert classifier for high speed networks. In Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, Cambridge, MA, USA, 22–24 August 2013; pp. 73–80. [Google Scholar]
- Lyons, K.B. A Recommender System in the Cyber Defense Domain; AFIT Scholar: Dayton, OH, USA, 2014. [Google Scholar]
- Tsai, C.-F.; Lin, C.-Y. A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognit. 2010, 43, 222–229. [Google Scholar] [CrossRef]
- Aburomman, A.A.; Reaz, M.B.I. A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl. Soft Comput. 2016, 38, 360–372. [Google Scholar] [CrossRef]
- Horng, S.-J.; Su, M.-Y.; Chen, Y.-H.; Kao, T.-W.; Chen, R.-J.; Lai, J.-L.; Perkasa, C.D. A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst. Appl. 2011, 38, 306–313. [Google Scholar] [CrossRef]
- Khan, L.; Awad, M.; Thuraisingham, B. A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J. 2007, 16, 507–521. [Google Scholar] [CrossRef]
- Jabbar, M.; Aluvalu, R. RFAODE: A novel ensemble intrusion detection system. Procedia Comput. Sci. 2017, 115, 226–234. [Google Scholar] [CrossRef]
- Liao, N.; Tian, S.; Wang, T. Network forensics based on fuzzy logic and expert system. Comput. Commun. 2009, 32, 1881–1892. [Google Scholar] [CrossRef]
- Chadha, K.; Jain, S. Hybrid genetic fuzzy rule based inference engine to detect intrusion in networks. In Intelligent Distributed Computing; Springer: Cham, Germany, 2015; pp. 185–198. [Google Scholar]
Survey (Year) | Alert Correlation Approaches | Alert Prediction Methods | Dataset Issue |
---|---|---|---|
Sadoddin (2006) [15] | ✔ | ☒ | ☒ |
Mirheidari (2013) [16] | ✔ | ☒ | ☒ |
Salah (2013) [14] | ✔ | ✔ | ☒ |
Yu Beng (2014) [13] | ✔ | ☒ | ☒ |
Proposed Survey | ✔ | ✔ | ✔ |
Methods | Advantages | Disadvantages | References |
---|---|---|---|
Deep Learning | Useful in feature learning. | There is a confusion of how to adopt deep learning in alert correlation applications. | [3,30,31] |
Bayesian Network | High accuracy for detecting well-known attacks. | Use complex correlation techniques to discover root-case or attack scenario. | [6,26,27] |
Relational Time Series | Performing well in alert reduction, clustering, aggregation, and pattern-matching. | Difficult aspects of selecting representation methods when determining a compatible and adequate similarity measure. | [22,25] |
Machine Learning and Data Mining | Performed well in static networks, used to represent a well-defined attack scenarios. | Scalability is the big issue. | [5,19,22,23] |
Sequence Pattern Mining | These methods can detect known and unknown attack scenarios. | Complex algorithms. | [20,21] |
Network Attack Graph | High accuracy for known attacks. | Complex correlation algorithms. | [19,27] |
Plan Library | Correlation result is easy to understand. Discovers all attack scenario variants. | Knowledge build by expert, or predefined scenarios. Scalability problem. | [17,18,32] |
Approach | Pre-Knowledge or Rule | Alert Reduction | Reducing False Alerts | Alert Prioritization | Extract Attack Scenario | Predict Next Alert | Construct and Predict Attack |
---|---|---|---|---|---|---|---|
Similarity-based | ✔ | ✔ | ✔ | ☒ | ✔ | ☒ | ☒ |
Statistical-based | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ☒ |
Knowledge-based | ✔ | ☒ | ☒ | ✔ | ✔ | ☒ | ☒ |
Hybrid-based | ✔ | ✔ | ✔ | ✔ | ✔ | ☒ | ☒ |
Used Algorithms | Objective(s) | Accuracy (%) | Datasets | Type of Attacks | References |
---|---|---|---|---|---|
K-means + KNN | IDS | 93.55 | KDD-Cup’99 | DoS, User to Root (U2R), Remote to Local (R2L) and Probing Attack | [85] |
SVM + KNN + PSO | IDS | 88.44 | KDD-Cup 99 | DoS, User to Root (U2R), Remote to Local (R2L) and Probing Attack | [86] |
HC + SVM | IDS | 95.72, 69.8 | KDD Cup 1999, 1998 DARPA | DoS, User to Root (U2R), Remote to Local (R2L) and Probing Attack | [87,88] |
RF + AODE | IDS | 90.51 | Kyoto | Various attacks against honeypots | [89] |
FL + ES | Network forensics | 91.5 | DARPA 2000 | DDoS, DARPA attacks | [90] |
FL + GA | IDS | 94.6 | DARPA-KDD99 | DoS, User to Root (U2R), Remote to Local (R2L) and Probing Attack | [91] |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Albasheer, H.; Md Siraj, M.; Mubarakali, A.; Elsier Tayfour, O.; Salih, S.; Hamdan, M.; Khan, S.; Zainal, A.; Kamarudeen, S. Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey. Sensors 2022, 22, 1494. https://doi.org/10.3390/s22041494
Albasheer H, Md Siraj M, Mubarakali A, Elsier Tayfour O, Salih S, Hamdan M, Khan S, Zainal A, Kamarudeen S. Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey. Sensors. 2022; 22(4):1494. https://doi.org/10.3390/s22041494
Chicago/Turabian StyleAlbasheer, Hashim, Maheyzah Md Siraj, Azath Mubarakali, Omer Elsier Tayfour, Sayeed Salih, Mosab Hamdan, Suleman Khan, Anazida Zainal, and Sameer Kamarudeen. 2022. "Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey" Sensors 22, no. 4: 1494. https://doi.org/10.3390/s22041494
APA StyleAlbasheer, H., Md Siraj, M., Mubarakali, A., Elsier Tayfour, O., Salih, S., Hamdan, M., Khan, S., Zainal, A., & Kamarudeen, S. (2022). Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey. Sensors, 22(4), 1494. https://doi.org/10.3390/s22041494