Intrusion Alert Framework using Semantic Web and Data Mining Approach

Main Article Content

Jatuphum Juanchaiyaphum
Preecha Noiumkar
Vuttichai Vichaianchai


This research proposes a combination of semantic web and datamining approach to examine alert logs and reconstruct attack scenarios that provide crucial evidences to understand about damaging effects, emerged from the attack scenarios. This method extracts information from low-level alerts using ontological knowledge that the candidate attack scenarios are generated using a relationship between alerts, defined by the applied Cyber kill-chain concept. Afterward, Association rule algorithm is applied to mine frequent attack sequential patterns from candidate attack scenarios. Experiments using the DARPA 2000 LLDOS 1.0 dataset indicated that the proposed approach is effective; it reduces the false alerts and extracts a useful information that can solve the direct problems and cut the analysis time. The comparison of the proposed approach with related alert-correlation approaches showed that the approach is more effective than others in particular completeness and soundness.


Download data is not yet available.

Article Details

How to Cite
Juanchaiyaphum, J., Noiumkar, P., & Vichaianchai, V. (2021). Intrusion Alert Framework using Semantic Web and Data Mining Approach. Journal of Applied Informatics and Technology, 3(2), 63–81.
Research Article


Al-Mamory, S.O., & Zhang, H.L. (2007). Scenario discovery using abstracted correlation graph. In the International Conference on Computational Intelligence and Security (CIS) (pp. 702-706). IEEE.

Apache. (2017). Apache Jena. Retrieved 20 March 2017, Retrieved from

Barik, M.S. (2018). AGQL: A query language for attack graph based network vulnerability analysis. In the Fifth International Conference on Emerging Applications of Information Technology (EAIT) (pp. 1-4).

Bryant, B.D., & Saiedian, H. (2017). A novel kill-chain framework for remote security log analysis with SIEM software. Computers & Security, 67, 198-210.

de Alvarenga, S.C., Barbon, S., Miani, R.S., Cukier, M., & Zarpelão, B.B. (2018). Process mining and hierarchical clustering to help intrusion alert visualization. Computers & Security, 73, 474-491.

Debar, H., Curry, D.A., & Feinstein, B.S. (2007). The intrusion detection message exchange format (IDMEF). Request for Comments (Experimental).

García, V., Mollineda, R.A., & Sánchez, J.S. (2008). On the k-NN performance in a challenging scenario of imbalance and overlapping. Pattern Analysis and Applications, 11, 269-280.

Hahn, A., Thomas, R.K., Lozano, I., & Cardenas, A. (2015). A multi-layered and kill-chain based security analysis framework for cyber-physical systems. International Journal of Critical Infrastructure Protection, 11, 39-50.

Jungja, K., Ceong, H., & Yonggwan, W. (2009). Weighted association rule mining for item groups with different properties and risk assessment for networked systems. IEICE TRANSACTIONS on Information and Systems, 92(1), 10-15.

Li, W., & Tian, S. (2008). XSWRL, an extended semantic web rule language. In the Intelligent Information Technology Application (IITA) (pp. 437-441). IEEE.

Li, W., & Tian, S. (2010). An ontology-based intrusion alerts correlation system. Expert Systems with Applications, 37(10), 7138-7146.

Li, W., Zhi-tang, L., Dong, L., & Jie, L. (2007). Attack scenario construction with a new sequential mining technique. In the Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD) (pp. 872-877), IEEE.

López, V., Fernández, A., García, S., Palade, V., & Herrera, F. (2013). An insight into classification with imbalanced data: Empirical results and current trends on using data intrinsic characteristics. Information Sciences, 250, 113-141.

Martin, L. (2014). Cyber Kill Chain®. Retrieved from

MIT Lincoln Lab. (2002). DARPA intrusion detection scenario specific datasets. Retrieved from

Ning, P., Cui, Y., & Reeves, D.S. (2002). Constructing attack scenarios through correlation of intrusion alerts. In the 9th ACM Conference on Computer and Communications Security (CCS) (pp. 245-254). ACM.

NIST Computer Security Division. (2005). NVD-national vulnerability database. Retrieved from

NIST Computer Security Division. (2007). CPE-common platform enumeration. Retrieved from

NIST Computer Security Division. (2016). CVSS-common vulnerability scoring system. Retrieved from

Njogu, H.W., Jiawei, L., Kiere, J.N., & Hanyurwimfura, D. (2013). A comprehensive vulnerability based alert management approach for large networks. Future Generation Computer Systems, 29(1), 27-45.

Ontotext. (2017). Graph DB ™. 7.1. Retrieved from:

OWASP. (2017). Application security risks-2017, open web application security project (OWASP).

Saad, S., & Traore, I. (2013). Semantic aware attack scenarios reconstruction. Journal of Information Security and Applications, 18(1), 53-67.

Sadighian, A., Fernandez, J.M., Lemay, A., & Zargar, S.T. (2014). ONTIDS: A highly flexible context-aware and ontology-based alert correlation framework. In Danger, L.J., Debbabi, M., Marion, J.-Y., Garcia-Alfaro, J., & Heywood, Z.N. (Eds.), Foundations and Practice of Security: 6th International Symposium (FPS) (pp. 161-177). Springer: Cham.

Snort. (2017). Retrieved from:

The MITRE Corporation. (2006). CVE-common vulnerabilities and exposures. Retrieved from:

The MITRE Corporation. (2010). CWE-common weakness enumeration. Retrieved from

Yu-Xin, D., Hai-Sen, W., & Qing-Wei, L. (2008). Intrusion scenarios detection based on data mining. In the International Conference on Machine Learning and Cybernetics (ICMLC) (pp. 1293-1297). IEEE.

Yuan, B., Pan, Z., Shi, F., & Li, Z. (2020). An attack path generation methods based on graph database. In the 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (pp. 1905-1910). IEEE.