Alarm clustering for intrusion detection systems in computer networks

被引:71
|
作者
Perdisci, Roberto [1 ]
Giacinto, Giorgio [1 ]
Roli, Fabio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
computer security; intrusion detection; alarm clustering;
D O I
10.1016/j.engappai.2006.01.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Until recently, network administrators manually arranged alarms produced by intrusion detection systems (IDS) to attain a high-level description of cyberattacks. As the number of alarms is increasingly growing, automatic tools for alarm clustering have been proposed to provide such a high-level description of the attack scenarios. In addition, it has been shown that effective threat analysis requires the fusion of different sources of information, such as different IDS. This paper proposes a new strategy to perform alarm clustering which produces unified descriptions of attacks from alarms produced by multiple IDS. In order to be effective, the proposed alarm clustering system takes into account two characteristics of IDS: (i) for a given attack, different sensors may produce a number of alarms reporting different attack descriptions. and (ii) a certain attack description may be produced by the IDS in response to different types of attack. Experimental results show that the high-level alarms produced by the alarm clustering module effectively summarize the attacks, drastically reducing the volume of alarms presented to the administrator. In addition, these high-level alarms can be used as the base to perform further higher-level threat analysis. (C) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:429 / 438
页数:10
相关论文
共 50 条
  • [1] Alarm clustering for intrusion detection systems in computer networks
    Giacinto, G
    Perdisci, R
    Roli, F
    [J]. MACHINE LEARNING AND DATA MINING IN PATTERN RECOGNITION, PROCEEDINGS, 2005, 3587 : 184 - 193
  • [2] Intrusion detection in computer networks by multiple classifier systems
    Glacinto, G
    Roli, F
    [J]. 16TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL II, PROCEEDINGS, 2002, : 390 - 393
  • [3] Intrusion Detection in Sensor Networks Using Clustering and Immune Systems
    Bankovic, Zorana
    Moya, Jose M.
    Araujo, Alvaro
    de Goyeneche, Juan-Mariano
    [J]. INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, PROCEEDINGS, 2009, 5788 : 408 - 415
  • [4] Intrusion Detection in Computer Networks Using Optimum-Path Forest Clustering
    Costa, Kelton
    Pereira, Clayton
    Nakamura, Rodrigo
    Papa, Joao
    [J]. 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 128 - 131
  • [5] A supervised clustering algorithm for computer intrusion detection
    Xiangyang Li
    Nong Ye
    [J]. Knowledge and Information Systems, 2005, 8 : 498 - 509
  • [6] A supervised clustering algorithm for computer intrusion detection
    Li, XY
    Ye, N
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 8 (04) : 498 - 509
  • [7] Design and analysis of genetic fuzzy systems for intrusion detection in computer networks
    Abadeh, Mohammad Saniee
    Mohamadi, Hamid
    Habibi, Jafar
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (06) : 7067 - 7075
  • [8] Using Artificial Neural Network in Intrusion Detection Systems to Computer Networks
    Dias, L. P.
    Cerqueira, J. J. F.
    Assis, K. D. R.
    Almeida, R. C., Jr.
    [J]. 2017 9TH COMPUTER SCIENCE AND ELECTRONIC ENGINEERING (CEEC), 2017,
  • [9] Intrusion Detection Alarm Filtering Technology Based on Ant Colony Clustering Algorithm
    Yang, Xu
    Hui, Zhao
    [J]. PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015, 2015, : 470 - 473
  • [10] Network intrusion detection systems in high-speed traffic in computer networks
    Bul'ajoul, Waleed
    James, Anne
    Pannu, Mandeep
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 168 - 175