Alarm clustering for intrusion detection systems in computer networks

被引:71
|
作者
Perdisci, Roberto [1 ]
Giacinto, Giorgio [1 ]
Roli, Fabio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
computer security; intrusion detection; alarm clustering;
D O I
10.1016/j.engappai.2006.01.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Until recently, network administrators manually arranged alarms produced by intrusion detection systems (IDS) to attain a high-level description of cyberattacks. As the number of alarms is increasingly growing, automatic tools for alarm clustering have been proposed to provide such a high-level description of the attack scenarios. In addition, it has been shown that effective threat analysis requires the fusion of different sources of information, such as different IDS. This paper proposes a new strategy to perform alarm clustering which produces unified descriptions of attacks from alarms produced by multiple IDS. In order to be effective, the proposed alarm clustering system takes into account two characteristics of IDS: (i) for a given attack, different sensors may produce a number of alarms reporting different attack descriptions. and (ii) a certain attack description may be produced by the IDS in response to different types of attack. Experimental results show that the high-level alarms produced by the alarm clustering module effectively summarize the attacks, drastically reducing the volume of alarms presented to the administrator. In addition, these high-level alarms can be used as the base to perform further higher-level threat analysis. (C) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:429 / 438
页数:10
相关论文
共 50 条
  • [41] The Use of Artificial Intelligence for the Intrusion Detection System in Computer Networks
    Yip Ortuno, Santiago
    Hernandez Aguilar, Jose Alberto
    Taboada, Blanca
    Ochoa Ortiz, Carlos Alberto
    Perez Ramirez, Miguel
    Arroyo Figueroa, Gustavo
    [J]. ADVANCES IN SOFT COMPUTING, MICAI 2017, PT I, 2018, 10632 : 302 - 312
  • [42] Intrusion detection based on Machine Learning techniques in computer networks
    Dina, Ayesha S.
    Manivannan, D.
    [J]. INTERNET OF THINGS, 2021, 16
  • [43] Enhancing Online Intrusion Detection Systems via Attack Clustering
    Yavari, Sara
    Oteafy, Sharief
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 4650 - 4655
  • [44] Intrusion Detection in Computer Networks based on Machine Learning Algorithms
    Osareh, Alireza
    Shadgar, Bita
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (11): : 15 - 23
  • [45] Abstracting massive data for lightweight intrusion detection in computer networks
    Wang, Wei
    Liu, Jiqiang
    Pitsilis, Georgios
    Zhang, Xiangliang
    [J]. INFORMATION SCIENCES, 2018, 433 : 417 - 430
  • [46] Intrusion Detection in Computer Networks via Machine Learning Algorithms
    Ertam, Fatih
    Kilincer, Ilhan Firat
    Yaman, Orhan
    [J]. 2017 INTERNATIONAL ARTIFICIAL INTELLIGENCE AND DATA PROCESSING SYMPOSIUM (IDAP), 2017,
  • [47] Boosting Optimum-Path Forest Clustering Through Harmony Search and Its Applications for Intrusion Detection in Computer Networks
    Costa, Kelton
    Pereira, Clayton
    Nakamura, Rodrigo
    Pereira, Luis
    Papa, Joao
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 181 - 185
  • [48] Alarm Analysis on Intrusion Detection of Network Flow
    Liu Yanshu
    Cao Yujun
    Lei Jiping
    [J]. INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 849 - 853
  • [49] An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    Depren, O
    Topallar, M
    Anarim, E
    Ciliz, MK
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) : 713 - 722
  • [50] Intrusion detection in wireless networks using clustering techniques with expert analysis
    Khoshgoftaar, TM
    Nath, SV
    Zhong, S
    Seliya, N
    [J]. ICMLA 2005: FOURTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, PROCEEDINGS, 2005, : 120 - 125