Back to Search
Start Over
Using Bayesian Networks to Fuse Intrusion Evidences and Detect Zero-Day Attack Paths
- Source :
- Network Security Metrics ISBN: 9783319665047
- Publication Year :
- 2017
- Publisher :
- Springer International Publishing, 2017.
-
Abstract
- This chapter studies the zero-day attack path identification problem. Detecting zero-day attacks is a fundamental challenge faced by enterprise network security defense. A multi-step attack involving one or more zero-day exploits forms a zero-day attack path. This chapter describes a prototype system called ZePro, which takes a probabilistic approach for zero-day attack path identification. ZePro first constructs a network-wide system object instance graph by parsing system calls collected from all hosts in the network, and then builds a Bayesian network on top of the instance graph. The instance-graph-based Bayesian network is able to incorporate the collected intrusion evidence and infer the probabilities of object instances being infected. By connecting the instances with high probabilities, ZePro is able to generate the zero-day attack paths. This chapter evaluated the effectiveness of ZePro for zero-day attack path identification.
- Subjects :
- Exploit
Computer science
Probabilistic logic
Bayesian network
Computer security
computer.software_genre
Object (computer science)
Identification (information)
Path (graph theory)
Enterprise private network
Graph (abstract data type)
Data mining
computer
Computer Science::Cryptography and Security
Subjects
Details
- ISBN :
- 978-3-319-66504-7
- ISBNs :
- 9783319665047
- Database :
- OpenAIRE
- Journal :
- Network Security Metrics ISBN: 9783319665047
- Accession number :
- edsair.doi...........841b222fe7c7477323eda26800d707c7
- Full Text :
- https://doi.org/10.1007/978-3-319-66505-4_5