Zhichao Hu1, Xiangzhan Yu1,*, Jiantao Shi1, Lin Ye1,2
CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 695-711, 2021, DOI:10.32604/cmc.2021.017574
- 04 June 2021
Abstract With the continuous development of network technology, various large-scale cyber-attacks continue to emerge. These attacks pose a severe threat to the security of systems, networks, and data. Therefore, how to mine attack patterns from massive data and detect attacks are urgent problems. In this paper, an approach for attack mining and detection is proposed that performs tasks of alarm correlation, false-positive elimination, attack mining, and attack prediction. Based on the idea of CluStream, the proposed approach implements a flow clustering method and a two-step algorithm that guarantees efficient streaming and clustering. The context of an… More >