首页    期刊浏览 2024年09月19日 星期四
登录注册

文章基本信息

  • 标题:An Attribution of Cyberattack using Association Rule Mining (ARM)
  • 本地全文:下载
  • 作者:Md Sahrom Abu ; Siti Rahayu Selamat ; Robiah Yusof
  • 期刊名称:International Journal of Advanced Computer Science and Applications(IJACSA)
  • 印刷版ISSN:2158-107X
  • 电子版ISSN:2156-5570
  • 出版年度:2020
  • 卷号:11
  • 期号:2
  • DOI:10.14569/IJACSA.2020.0110246
  • 出版社:Science and Information Society (SAI)
  • 摘要:With the rapid development of computer networks and information technology, an attacker has taken advantage to manipulate the situation to launch a complicated cyberattack. This complicated cyberattack causes a lot of problems among the organization because it requires an effective cyberattack attribution to mitigate and reduce the infection rate. Cyber Threat Intelligence (CTI) has gain wide coverage from the media due to its capability to provide CTI feeds from various data sources that can be used for cyberattack attribution. In this paper, we study the relationship of basic Indicator of Compromise (IOC) based on a network traffic dataset from a data mining approach. This dataset is obtained using a crawler that is deployed to pull security feed from Shadowserver. Then an association analysis method using Apriori Algorithm is implemented to extract rules that can discover interesting relationship between large sets of data items. Finally, the extracted rules are evaluated over the factor of interestingness measure of support, confidence and lift to quantify the value of association rules generated with Apriori Algorithm. By implementing the Apriori Algorithm in Shadowserver dataset, we discover some association rules among several IOC which can help attribute the cyberattack.
  • 关键词:CTI; association rule mining; Apriori Algorithm; attribution; interestingness measures
国家哲学社会科学文献中心版权所有