Abstract
An intrusion and attack detection system usually focuses on classifying a record as either normal or abnormal. In some cases such as insider attacks, attackers rely on feedback from the attacked system, which enables them to gradually manipulate their attempts in order to avoid detection. This paper proposes the notion of accumulative manipulation that can be observed through a number of attempts accomplished by the attacker, which forms the basis of the Attacker Learning Curve (ALC). Based on a controlled experiment, we first show that the ALC for three different attack strategies are consistent between two different groups of subjects. We then define a strategy detection mechanism, which is experimentally shown to be accurate more than 70% of the time.
| Original language | English |
|---|---|
| DOIs | |
| Publication status | Published - 2013 |
| Event | 2013 8th International Conference on Risks and Security of Internet and Systems, CRiSIS 2013 - La Rochelle, France Duration: 23 Oct 2013 → 25 Oct 2013 |
Conference
| Conference | 2013 8th International Conference on Risks and Security of Internet and Systems, CRiSIS 2013 |
|---|---|
| Country/Territory | France |
| City | La Rochelle |
| Period | 23/10/13 → 25/10/13 |
Keywords
- Attacker Learning Curve
- Intrusion Detection
- Strategy Detection
- Supervised Learning
- Unsupervised Learning
ASJC Scopus subject areas
- Computer Networks and Communications
- Safety, Risk, Reliability and Quality