Modeling Alerts for IDS Correlation

被引:0
|
作者
Roschke, Sebastian [1 ]
Cheng, Feng [1 ]
Meinel, Christoph [1 ]
机构
[1] Univ Potsdam, Hasso Plattner Inst HPI, POB 900460, D-14440 Potsdam, Germany
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection Systems (IDS) have been used widely to detect malicious behavior in network communication and hosts. IDS management is an important capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located in the distributed environment. Sophisticated attacks are difficult to detect and it is necessary to integrate multiple data sources for detection and correlation. Attack graph (AG) is used as an effective method to model, analyze, and evaluate the security of complicated computer systems or networks. The attack graph workflow consists of three parts: information gathering, attack graph construction, and visualization. This paper proposes the integration of the AG workflow with an IDS management system to improve the quality of alert correlation. The vulnerability and system information is used to remodel the incoming IDS alerts. The AG is used during the correlation process to filter and optimize correlation results. A prototype is implemented using automatic vulnerability extraction and AG construction based on unified data models.
引用
收藏
页码:98 / 105
页数:8
相关论文
共 50 条
  • [1] Classifying IDS Alerts Automatically for use in Correlation Systems
    MirShahJafari, Mohammad
    Ghavamnia, Hamed
    [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 126 - 130
  • [2] Correlation analysis system using VA data, IDS alerts
    Lee, Jong-Hyouk
    Chung, Tai-Myung
    [J]. Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1600 - 1603
  • [3] IDS alerts correlation using grammar-based approach
    Al-Mamory, Safaa O.
    Zhang, Hongli
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2009, 5 (04): : 271 - 282
  • [4] Adaptive IDS Alerts Correlation according to the traffic type and the attacks properties
    Sourour, Meharouech
    Adel, Bouhoula
    Tarek, Abbes
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1652 - 1657
  • [5] Improving the management of IDS alerts
    Tu Hoang Nguyen
    Luo, JiaWei
    Njogu, Humphrey Waita
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 393 - 406
  • [6] On the sufficiency of time-based correlation for signature-based IDS alerts
    Neville, SW
    [J]. 2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 836 - 839
  • [7] A survey on IDS alerts processing techniques
    Al-Mamory, Safaa O.
    Zhang, Hong Li
    [J]. PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 69 - 78
  • [8] Modeling network intrusion detection alerts for correlation
    Zhou, Jingmin
    Heckman, Mark
    Reynolds, Brennen
    Carlson, Adam
    Bishop, Matt
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (01)
  • [9] Experiences implementing a common format for IDS alerts
    Erlinger, M
    Feinstein, B
    Matthews, G
    Staniford, S
    Walther, A
    [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 113 - 113
  • [10] Using Alert Cluster to reduce IDS Alerts
    Njogu, Humphrey Waita
    Luo Jiawei
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 467 - 471