Alert correlation framework for malware detection by anomaly-based packet payload analysis

被引:17
|
作者
Maestre Vidal, Jorge [1 ]
Sandoval Orozco, Ana Luella [1 ]
Garcia Villalba, Luis Javier [1 ]
机构
[1] Univ Complutense Madrid, Sch Comp Sci, Dept Software Engn & Artificial Intelligence DISI, Grp Anal Secur & Syst, Off 431,Calle Prof Jose Garcia Santesmases S-N, E-28040 Madrid, Spain
关键词
Alert correlation; Anomalies; Intrusion detection system; Malware; Network; Payload; INTRUSION DETECTION; ATTACK SCENARIOS; MODEL; MULTISTEP; ALGORITHM; NETWORKS; SYSTEMS;
D O I
10.1016/j.jnca.2017.08.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection based on identifying anomalies typically emits a large amount of reports about the malicious activities monitored; hence information gathered is difficult to manage. In this paper, an alert correlation system capable of dealing with this problem is introduced. The work carried out has focused on the study of a particular family of sensors, namely those which analyze the payload of network traffic looking for malware. Unlike conventional approaches, the information provided by the network packet headers is not taken into account. Instead, the proposed strategy considers the payload of the monitored traffic and the characteristics of the models built during the training of such detectors, in this way supporting the general-purpose incident management tools. It aims to analyze, classify and prioritize alerts issued, based on two criteria: the risk of threats being genuine and their nature. Incidences are studied both in a one-to-one and in a group context. This implies the consideration of two different processing layers: The first one allows fast reactions and resilience against certain adversarial attacks, and on the other hand, the deeper layer facilitates the reconstruction of attack scenarios and provides an overview of potential threats. Experiments conducted by analyzing real traffic demonstrated the effectiveness of the proposal.
引用
收藏
页码:11 / 22
页数:12
相关论文
共 50 条
  • [21] Anomaly-based fault detection system in distributed system
    Kim, Byoung uk
    Hariri, Salim
    SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 782 - +
  • [22] An Anomaly-based Detection System for Monitoring Kubernetes Infrastructures
    Almaraz-Rivera, Josue Genaro
    IEEE LATIN AMERICA TRANSACTIONS, 2023, 21 (03) : 457 - 465
  • [23] Game Theoretical Method for Anomaly-Based Intrusion Detection
    Wang, Zhiyong
    Xu, Shengwei
    Xu, Guoai
    Yin, Yongfeng
    Zhang, Miao
    Sun, Dawei
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [24] Design of an Anomaly-based Threat Detection & Explication System
    Luh, Robert
    Schrittwieser, Sebastian
    Marschalek, Stefan
    Janicke, Helge
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 397 - 402
  • [25] Anomaly-Based Annotation Errors Detection in TTS Corpora
    Matousek, Jindrich
    Tihelka, Daniel
    16TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2015), VOLS 1-5, 2015, : 314 - +
  • [26] Personal anomaly-based intrusion detection smart card using behavioural analysis
    Rossudowski, A. M.
    Venter, H. S.
    Eloff, J. H. P.
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 217 - +
  • [27] A transparent and scalable anomaly-based DoS detection method
    Joldzic, Ognjen
    Djuric, Zoran
    Vuletic, Pavle
    COMPUTER NETWORKS, 2016, 104 : 27 - 42
  • [28] IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack
    Fadhlillah, Aghnia
    Karna, Nyoman
    Irawan, Arif
    2020 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND INTELLIGENCE SYSTEM (IOTAIS), 2021, : 18 - 22
  • [29] IEEE 802.11 Anomaly-based Behavior Analysis
    Alipour, Hamid
    Al-Nashif, Youssif B.
    Hariri, Salim
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
  • [30] Anomaly-based intrusion detection using Bayesian networks
    Tylman, Wojciech
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 211 - +