Skip to main content

Standardization of Intelligent Information of Specific Attack Trends

  • Conference paper
  • First Online:
Progress in Advanced Computing and Intelligent Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 714))

Abstract

In recent days, cyber-attacks are rising rapidly by using various new techniques. These attacks have huge impact on organizational and an individual security. As many times an attack has been detected but it is too late to recover the damage perform by that attack. To study on previous attacks some organizations like Defense Advanced Research Project Agency (DARPA) provide offline dataset for researchers. KDD and DARPA dataset attributes was playing a good role in detection of many attacks and further useful in prevention of attacks also. But in recent days, dataset provided by them, become old one and not gives fruitful results. To keep in mind, the technique used in this research work is providing machine readable dataset attributes of specific attacks in a standard format which is CSV (Comma Separated Values) format. The attack data is captured by deploying various honeypot sensors. The achievement of this research work is “sharing of targeted attack data like Brute force Attack, Exploits etc., in machine readable form in standard format”. This information is useful for security researchers, situational awareness programs and security communities. Security testing is another area, also needs some dataset attributes for security testing of the softwares or tools.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Masato Terada: Work on Cyber Security Measures for Collaboration between Organizations: Vol. 65, No. 1 in 2016.

    Google Scholar 

  2. Ashima Rattan, Navroop Kaur, Saurabh Chamotra and Shashi Bhusan: Attack Data Usability and Challenges in its Capturing and Sharing In the 3rd International Conference on Cyber Security (ICCS-2017) at Rajasthan Technical University Kota (Rajasthan), Published in “International Journal of Advanced Studies in Computer Science and Engineering” (IJASCSE): Vol-6-theme-based-issue-9.

    Google Scholar 

  3. http://www.icasi.org/cvrf/.

  4. Vijay Varadharajan: On Malware Characterization and Attack Classification: Proceedings of the First Australasian Web Conference (AWC ‘13), Vol. 144, 43–47 in 2013.

    Google Scholar 

  5. Ashima Rattan and Shashi Bushan: IP Reputation Engine Based upon Malicious Events In the proceedings of the 11th INDIACom 2017 in the IEEE 4th International conference on “Computing for Sustainable Global Development”, March 2017.

    Google Scholar 

  6. Sean Barnum: Standardizing Cyber Threat Intelligence Information with the Structured Threat Information expression (STIX™): Version-1.1, Revision-1 in Feb 20, 2014.

    Google Scholar 

  7. Panos Kampanakis: Security automation and threat information-sharing options: co-publish by the IEEE computer and reliability societies: Vol. 12, Issue-5, 42–51 in September/October 2014.

    Google Scholar 

  8. Kutub Thakur Meikang Qiu Keke Gai and Md Liakat Ali: An Investigation on Cyber Security Threats and Security Models in the IEEE 2nd International Conference on Cyber Security and Cloud Computing: 978-1-4673-9300-3/15, pp. 307–311, 2015.

    Google Scholar 

  9. Komal K. More and Prof. Pramod B. Gosavi: A Real Time System for Denial of service Attack Detection Based on Multivariate Correlation Analysis Approach in IEEE International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT): 978-1-4673-9939-5/16/, pp. 1125–1131, 2016.

    Google Scholar 

  10. Saoreen Rahman, Muhammad Ahmed and M. Shamim Kaiser: ANFIS Based Cyber Physical Attack Detection System in IEEE 5th International Conference on Informatics, Electronics and Vision (ICIEV): 978-1-5090-1269-5/16/, pp. 944–948, 2016.

    Google Scholar 

  11. D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver: Inside the slammer worm: In Proceedings of IEEE Security and Privacy: Vol. 1, Issue: 4, 33–39 in June 2003.

    Google Scholar 

  12. Dhanashri Ashok Bhosale and Vanita Manikrao Mane: Comparative Study and Analysis of Network Intrusion Detection Tools: International Conference on Applied and Theoretical Computing and Communication Technology (ICATCCT), 312–315, in 2015.

    Google Scholar 

  13. Ulrik Franke, Joel Brynielsson: Cyber situational awareness A systematic review of the literature, Computers & Security, Volume 46, Pages 18–31 in October 2014.

    Google Scholar 

  14. Guodong Zhao, Ke Xu, Lei Xu, and Bo Wu; “Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis”, IEEE 20 July 2015, pp. 1132–1142.

    Google Scholar 

  15. Jessica Steinberger, Anna Sperottoz, Mario Gollingy and Harald Baier: How to Exchange Security Events? Overview and Evaluation of Formats and Protocols in Biometrics and Internet Security: IEEE International Symposium on Integrated Network Management (IM2015), Darmstadt, Germany 2015.

    Google Scholar 

  16. M. Dacier, F. Pouget, and H. Debar: Attack processes found on the internet: NATO Research and technology symposium IST-041 “Adaptive Defence in Unclassified Networks”, 19 April 2004, Toulouse, France.

    Google Scholar 

  17. Honeynet.org.

    Google Scholar 

  18. Dikshant Gupta, Suhani Singhal, Shamita Malik and Archana Singh: Network Intrusion Detection System Using various data mining techniques in IEEE International Conference on Research Advances in Integrated Navigation Systems (RAINS - 2016), April 06–07, 2016, R. L. Jalappa Institute of Technology, Doddaballapur, Bangalore, India: 978-1-4673-8819-8/16/, 2016.

    Google Scholar 

  19. Logrhythm Labs Embedded Expertise on Security Analysis Suite-Honeypot.

    Google Scholar 

  20. Sanjeev Kumar, Rakesh Sehgal and J.S. Bhatia: Hybrid Honeypot Framework for Malware Collection and Analysis in IEEE 7th International Conference on Industrial and Information Systems (ICIIS-2012), August 6–9, 2012, IIT Chennai, Published in IEEE Xplore.

    Google Scholar 

  21. Daniel Ramsbrock: Profiling Attacker Behavior Following SSH Compromises: Department of Computer Science University of Maryland, College Park in 2007.

    Google Scholar 

  22. Eric Ziegast, Paul Vixie: Domain Name Service Based block List in 1997.

    Google Scholar 

  23. CERT Polska and European Union Agency for Network and Information Security (ENISA) team: Standards and tools for exchange and processing of actionable information in November 2014.

    Google Scholar 

  24. Nazmul Shahadat, Imam Hossain, Anisur Rohman and Nawshi Matin: Experimental Analysis of Data Mining Application for Intrusion Detection with Feature reduction in International Conference on Electrical, Computer and Communication Engineering (ECCE), February 16–18, 2017, Cox’s Bazar, Bangladesh, pp. 209–216.

    Google Scholar 

  25. Zhang, Xiaoming, and Guang Wang. “Hadoop-Based System Design for Website Intrusion Detection and Analysis.” 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), IEEE, 2015.

    Google Scholar 

  26. El Mostapha Chakir, Mohamed Moughit And Youness Idrissi Khamlichi: An Efficient Method for Evaluating Alerts of Intrusion Detection Systems in the conference of IEEE 978-1-5090-6681-0/17/ in 2017.

    Google Scholar 

  27. V. Yegneswaran, P. Barford, and D. Plonka: Design and use of internet sinks for network abuse monitoring: Lecture Notes in Computer Science book series (LNCS), Vol. 3224, Springer, Berlin, Heidelberg 2004.

    Google Scholar 

  28. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani: A Detailed Analysis of the KDD CUP 99 Data Set in the conference of IEEE in 2009.

    Google Scholar 

  29. Mike Schiffman: Cisco Systems on The Common Vulnerability Reporting Framework An Internet Consortium for Advancement of Security on the Internet (ICASI) Whitepaper in 2011.

    Google Scholar 

  30. Abdul Razzaq, Ali Hur, H Farooq Ahmad, Muddassar Masood: Cyber Security: Threats, Reasons, Challenges, Methodologies and State of the Art Solutions for Industrial Applications 2013 in the conference of IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), 1–6. 2013.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashima Rattan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rattan, A., Kaur, N., Bhushan, S. (2019). Standardization of Intelligent Information of Specific Attack Trends. In: Panigrahi, C., Pujari, A., Misra, S., Pati, B., Li, KC. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 714. Springer, Singapore. https://doi.org/10.1007/978-981-13-0224-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0224-4_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0223-7

  • Online ISBN: 978-981-13-0224-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics