Research Article

Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

Table 2

Results of clustering algorithms with different dimensions.

Clustering algorithmDimensions of clustering algorithmResult

Fuzzy Clustering which includes the attack-event dimensionalarm_event, IP address, timestampEscalating attack mechanism, and there is higher correlation in an attack sequence

Fuzzy Clustering which exclude the attack-event dimensionIP address, timestampAttack events intersect, and there is small correlation in an attack sequence