"Persistent threat pattern discovery"
Title | "Persistent threat pattern discovery" |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | F. Quader, V. Janeja, J. Stauffer |
Conference Name | 2015 IEEE International Conference on Intelligence and Security Informatics (ISI) |
Date Published | May |
Publisher | IEEE |
ISBN Number | 978-1-4799-9889-0 |
Accession Number | 15311612 |
Keywords | advanced persistent threat, Advanced Persistent Threat (APT), APT, ARM, association rule mining, Association Rule Mining (ARM), association rules, cyber-attack, data mining, frequent pattern discovery, Government, Intrusion detection, Intrusion Detection Systems, IP networks, network data, Persistent Threat (PT), persistent threat identification, persistent threat pattern discovery, pubcrawl170101, security of data |
Abstract | Advanced Persistent Threat (APT) is a complex (Advanced) cyber-attack (Threat) against specific targets over long periods of time (Persistent) carried out by nation states or terrorist groups with highly sophisticated levels of expertise to establish entries into organizations, which are critical to a country's socio-economic status. The key identifier in such persistent threats is that patterns are long term, could be high priority, and occur consistently over a period of time. This paper focuses on identifying persistent threat patterns in network data, particularly data collected from Intrusion Detection Systems. We utilize Association Rule Mining (ARM) to detect persistent threat patterns on network data. We identify potential persistent threat patterns, which are frequent but at the same time unusual as compared with the other frequent patterns. |
URL | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7165967&isnumber=7165923 |
DOI | 10.1109/ISI.2015.7165967 |
Citation Key | 7165967 |
- Government
- security of data
- pubcrawl170101
- persistent threat pattern discovery
- persistent threat identification
- Persistent Threat (PT)
- network data
- IP networks
- Intrusion Detection Systems
- Intrusion Detection
- advanced persistent threat
- frequent pattern discovery
- Data mining
- cyber-attack
- association rules
- Association Rule Mining (ARM)
- association rule mining
- arm
- APT
- Advanced Persistent Threat (APT)