Alarm clustering for intrusion detection systems in computer networks

被引:71
|
作者
Perdisci, Roberto [1 ]
Giacinto, Giorgio [1 ]
Roli, Fabio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
computer security; intrusion detection; alarm clustering;
D O I
10.1016/j.engappai.2006.01.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Until recently, network administrators manually arranged alarms produced by intrusion detection systems (IDS) to attain a high-level description of cyberattacks. As the number of alarms is increasingly growing, automatic tools for alarm clustering have been proposed to provide such a high-level description of the attack scenarios. In addition, it has been shown that effective threat analysis requires the fusion of different sources of information, such as different IDS. This paper proposes a new strategy to perform alarm clustering which produces unified descriptions of attacks from alarms produced by multiple IDS. In order to be effective, the proposed alarm clustering system takes into account two characteristics of IDS: (i) for a given attack, different sensors may produce a number of alarms reporting different attack descriptions. and (ii) a certain attack description may be produced by the IDS in response to different types of attack. Experimental results show that the high-level alarms produced by the alarm clustering module effectively summarize the attacks, drastically reducing the volume of alarms presented to the administrator. In addition, these high-level alarms can be used as the base to perform further higher-level threat analysis. (C) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:429 / 438
页数:10
相关论文
共 50 条
  • [31] Neural networks applied in intrusion detection systems
    Bonifacio, JM
    Cansian, AM
    de Carvalho, ACPLF
    Moreira, ES
    [J]. IEEE WORLD CONGRESS ON COMPUTATIONAL INTELLIGENCE, 1998, : 205 - 210
  • [32] INTELLIGENT AGENTS FOR INTRUSION DETECTION IN DISTRIBUTED COMPUTER SYSTEMS
    Walkowiak, Tomasz
    Parazel, Artur
    Mazurkiewicz, Jacek
    [J]. MENDELL 2009, 2009, : 322 - 327
  • [33] INTRUSION DETECTION - AN APPLICATION OF EXPERT SYSTEMS TO COMPUTER SECURITY
    BAUER, DS
    EICHELMAN, FR
    HERRERA, RM
    IRGON, AE
    [J]. 1989 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 1989, : 97 - 100
  • [34] A hybrid alarm management strategy in signature-based intrusion detection systems
    Munoz Cortes, Francisco
    Gaviria Gomez, Natalia
    [J]. 2019 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM 2019), 2019,
  • [35] INTRUSION AND HOLD-UP ALARM SYSTEMS AND THEIR RELIABILITY GLASS BREAK DETECTION
    Hart, J.
    Hartova, V.
    Bradna, J.
    [J]. PROCEEDING OF 6TH INTERNATIONAL CONFERENCE ON TRENDS IN AGRICULTURAL ENGINEERING 2016, 2016, : 171 - 174
  • [36] Nuisance alarm suppression techniques for fibre-optic intrusion detection systems
    Mahmoud, Seedahmed S.
    Visagathilagar, Yuvaraja
    Katsifolis, Jim
    [J]. THIRD ASIA PACIFIC OPTICAL SENSORS CONFERENCE, 2012, 8351
  • [37] Cyberattack triage using incremental clustering for intrusion detection systems
    Taheri, Sona
    Bagirov, Adil M.
    Gondal, Iqbal
    Brown, Simon
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (05) : 597 - 607
  • [38] Cyberattack triage using incremental clustering for intrusion detection systems
    Sona Taheri
    Adil M. Bagirov
    Iqbal Gondal
    Simon Brown
    [J]. International Journal of Information Security, 2020, 19 : 597 - 607
  • [39] WEIGHTED THRESHOLD-BASED CLUSTERING FOR INTRUSION DETECTION SYSTEMS
    Nikulin, Vladimir
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2006, 6 (01) : 1 - 19
  • [40] Spam Intrusion Detection in Computer Networks Using Intelligent Techniques
    Ribeiro, Patricia Bellin
    da Silva, Luis Alexandre
    Pontara da Costa, Kelton Augusto
    [J]. PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1357 - 1360