Alert correlation framework for malware detection by anomaly-based packet payload analysis

被引:17
|
作者
Maestre Vidal, Jorge [1 ]
Sandoval Orozco, Ana Luella [1 ]
Garcia Villalba, Luis Javier [1 ]
机构
[1] Univ Complutense Madrid, Sch Comp Sci, Dept Software Engn & Artificial Intelligence DISI, Grp Anal Secur & Syst, Off 431,Calle Prof Jose Garcia Santesmases S-N, E-28040 Madrid, Spain
关键词
Alert correlation; Anomalies; Intrusion detection system; Malware; Network; Payload; INTRUSION DETECTION; ATTACK SCENARIOS; MODEL; MULTISTEP; ALGORITHM; NETWORKS; SYSTEMS;
D O I
10.1016/j.jnca.2017.08.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection based on identifying anomalies typically emits a large amount of reports about the malicious activities monitored; hence information gathered is difficult to manage. In this paper, an alert correlation system capable of dealing with this problem is introduced. The work carried out has focused on the study of a particular family of sensors, namely those which analyze the payload of network traffic looking for malware. Unlike conventional approaches, the information provided by the network packet headers is not taken into account. Instead, the proposed strategy considers the payload of the monitored traffic and the characteristics of the models built during the training of such detectors, in this way supporting the general-purpose incident management tools. It aims to analyze, classify and prioritize alerts issued, based on two criteria: the risk of threats being genuine and their nature. Incidences are studied both in a one-to-one and in a group context. This implies the consideration of two different processing layers: The first one allows fast reactions and resilience against certain adversarial attacks, and on the other hand, the deeper layer facilitates the reconstruction of attack scenarios and provides an overview of potential threats. Experiments conducted by analyzing real traffic demonstrated the effectiveness of the proposal.
引用
收藏
页码:11 / 22
页数:12
相关论文
共 50 条
  • [31] Virtual Machine Introspection for Anomaly-Based Keylogger Detection
    Huseynov, Huseyn
    Kourai, Kenichi
    Saadawi, Tarek
    Igbe, Obinna
    2020 IEEE 21ST INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2020,
  • [32] AMiner: A Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection
    Landauer, Max
    Wurzenberger, Markus
    Skopik, Florian
    Hotwagner, Wolfgang
    Hoeld, Georg
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01):
  • [33] Payload Content based Network Anomaly Detection
    Thorat, Sandeep A.
    Khandelwal, Amit K.
    Bruhadeshwar, Bezawada
    Kishore, K.
    2008 FIRST INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES, VOLS 1 AND 2, 2008, : 134 - 139
  • [34] Anomaly-based Intrusion Detection System for smart lighting
    Lara, Agustin
    Estepa, Antonio
    Estepa, Rafael
    Diaz-Verdejo, Jesus E.
    Mayor, Vicente
    INTERNET OF THINGS, 2024, 28
  • [35] SCADA Networks Anomaly-based Intrusion Detection System
    Almehmadi, Abdulaziz
    11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [36] Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
    Fragkiadakis, Alexandros G.
    Siris, Vasilios A.
    Petroulakis, Nikolaos
    WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 192 - 203
  • [37] An Anomaly-Based IDS Framework Using Centroid-Based Classification
    Lin, Iuon-Chang
    Chang, Ching-Chun
    Peng, Chih-Hsiang
    SYMMETRY-BASEL, 2022, 14 (01):
  • [38] Anomaly-Based Network Intrusion Detection Using SVM
    Zhang, Yuan
    Yang, Qinghai
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos
    Ghafir, Ibrahim
    AsSadhan, Basil
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [39] Feature Selection for Effective Anomaly-Based Intrusion Detection
    Ghali, Noreen I.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 285 - 289
  • [40] Anomaly-based intrusion detection system for IoT application
    Bhavsar M.
    Roy K.
    Kelly J.
    Olusola O.
    Discover Internet of Things, 2023, 3 (01):