Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection

被引:0
|
作者
Mallissery, Sanoop [1 ]
Praveen, K. [2 ]
Sathar, Shahana [2 ]
机构
[1] Manipal Univ, Dept I&CT, MIT, Manipal, Karnataka, India
[2] Amrita Sch Engn, TIFAC Core Cyber Secur, Coimbatore, Tamil Nadu, India
关键词
IDS; Alert Fusion; Alert Correlation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Alert Correlation is a process that analyses the alerts produced by one or more Intrusion Detection Sensors and provides a clear picture of occurring or attempted intrusions. Even though the correlation process is often presented as a single step, the analysis is actually carried out by a number of components, each of which has a specific goal. The idea of prerequisites of an intrusion, that is the necessary condition for the intrusion to be successful and the possible outcomes of intrusion is the consequences. This method also help us to correlates two alerts if the consequence of the earlier alert prepares for the prerequisites of the later one. In this system, before alert classification we are performing normalization, pre-processing, and alert correlation. In correlation phase there are two types of correlation, which are duplicate removal (alert fusion) and consequence correlation. Thus the resulting alert set is clustered. Based on this analysis of the alert set, the prioritization component assigns an appropriate priority to every alert. This priority information is important for quickly discarding information that is irrelevant or of less importance. The second way of prioritizing is based on the number of alerts coming from the networked systems.
引用
收藏
页码:662 / +
页数:2
相关论文
共 50 条
  • [21] Intrusion Detection Using Data Mining with Correlation
    Singh, Varsha
    Puthran, Shubha
    Tiwari, Avanish
    [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 620 - 625
  • [22] Managing alerts in a multi-intrusion detection environment
    Cuppens, F
    [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 22 - 31
  • [23] Analysis and Prediction of Alerts in Perimeter Intrusion Detection System
    Aggarwal, Rizul
    Goswami, Anjali
    Kumar, Jitender
    Chullai, G. A.
    [J]. DEFENCE SCIENCE JOURNAL, 2020, 70 (06) : 619 - 625
  • [24] Deep Learning for Prioritizing and Responding to Intrusion Detection Alerts
    McElwee, Steven
    Heaton, Jeffrey
    Fraley, James
    Cannady, James
    [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 1 - 5
  • [25] An Effecient Method for Evaluating Alerts of Intrusion Detection Systems
    Chakir, El Mostapha
    Moughit, Mohamed
    Idrissi Khamlichi, Youness
    [J]. 2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [26] Dataset of intrusion detection alerts from a sharing platform
    Husak, Martin
    Zadnik, Martin
    Bartos, Vaclav
    Sokol, Pavol
    [J]. DATA IN BRIEF, 2020, 33
  • [27] Analysis and prediction of alerts in perimeter intrusion detection system
    Aggarwal, Rizul
    Goswami, Anjali
    Kumar, Jitender
    Chullai, G.A.
    [J]. Defence Science Journal, 2020, 70 (06): : 619 - 625
  • [28] Using data correlation to build an intrusion detection system
    Romano, L.
    Vianello, V.
    Antonio, S. D'
    Giordano, S.
    [J]. RECENT ADVANCES IN AUTOMATION & INFORMATION: PROCEEDINGS OF THE 10TH WSEAS INTERNATIONAL CONFERENCE ON AUTOMATION & INFORMATION (ICAI'09), 2009, : 342 - +
  • [29] An incremental intrusion detection model using alarms correlation
    Ahmadzadeh, Mohammad
    Vahidi, Javad
    Bidgoli, Behrouz Minaei
    Pourebrahimi, Alireza
    [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 541 - 562
  • [30] Using correlation engine and mobile agents for intrusion detection
    Lips, Reginald
    El-Kadhi, Nabil
    [J]. PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS , PTS 1-3: NEW ASPECTS OF COMPUTERS, 2008, : 662 - +