Detection of attack strategies

Research output: Contribution to conference (unpublished)Paperpeer-review

Abstract

An intrusion and attack detection system usually focuses on classifying a record as either normal or abnormal. In some cases such as insider attacks, attackers rely on feedback from the attacked system, which enables them to gradually manipulate their attempts in order to avoid detection. This paper proposes the notion of accumulative manipulation that can be observed through a number of attempts accomplished by the attacker, which forms the basis of the Attacker Learning Curve (ALC). Based on a controlled experiment, we first show that the ALC for three different attack strategies are consistent between two different groups of subjects. We then define a strategy detection mechanism, which is experimentally shown to be accurate more than 70% of the time.

Original languageEnglish
DOIs
Publication statusPublished - 2013
Event2013 8th International Conference on Risks and Security of Internet and Systems, CRiSIS 2013 - La Rochelle, France
Duration: 23 Oct 201325 Oct 2013

Conference

Conference2013 8th International Conference on Risks and Security of Internet and Systems, CRiSIS 2013
Country/TerritoryFrance
CityLa Rochelle
Period23/10/1325/10/13

Keywords

  • Attacker Learning Curve
  • Intrusion Detection
  • Strategy Detection
  • Supervised Learning
  • Unsupervised Learning

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Detection of attack strategies'. Together they form a unique fingerprint.

Cite this