Alert correlation framework for malware detection by anomaly-based packet payload analysis

被引:17
|
作者
Maestre Vidal, Jorge [1 ]
Sandoval Orozco, Ana Luella [1 ]
Garcia Villalba, Luis Javier [1 ]
机构
[1] Univ Complutense Madrid, Sch Comp Sci, Dept Software Engn & Artificial Intelligence DISI, Grp Anal Secur & Syst, Off 431,Calle Prof Jose Garcia Santesmases S-N, E-28040 Madrid, Spain
关键词
Alert correlation; Anomalies; Intrusion detection system; Malware; Network; Payload; INTRUSION DETECTION; ATTACK SCENARIOS; MODEL; MULTISTEP; ALGORITHM; NETWORKS; SYSTEMS;
D O I
10.1016/j.jnca.2017.08.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection based on identifying anomalies typically emits a large amount of reports about the malicious activities monitored; hence information gathered is difficult to manage. In this paper, an alert correlation system capable of dealing with this problem is introduced. The work carried out has focused on the study of a particular family of sensors, namely those which analyze the payload of network traffic looking for malware. Unlike conventional approaches, the information provided by the network packet headers is not taken into account. Instead, the proposed strategy considers the payload of the monitored traffic and the characteristics of the models built during the training of such detectors, in this way supporting the general-purpose incident management tools. It aims to analyze, classify and prioritize alerts issued, based on two criteria: the risk of threats being genuine and their nature. Incidences are studied both in a one-to-one and in a group context. This implies the consideration of two different processing layers: The first one allows fast reactions and resilience against certain adversarial attacks, and on the other hand, the deeper layer facilitates the reconstruction of attack scenarios and provides an overview of potential threats. Experiments conducted by analyzing real traffic demonstrated the effectiveness of the proposal.
引用
收藏
页码:11 / 22
页数:12
相关论文
共 50 条
  • [41] Alert correlation in a cooperative intrusion detection framework
    Cuppens, F
    Miège, A
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 202 - 215
  • [42] Performance Analysis and Comparison of Anomaly-based Intrusion Detection in Vehicular Ad hoc Networks
    Shams, Erfan A.
    Ulusoy, Ali Hakan
    Rizaner, Ahmet
    RADIOENGINEERING, 2020, 29 (04) : 664 - 671
  • [43] Robust anomaly-based intrusion detection system for in-vehicle network by graph neural network framework
    Junchao Xiao
    Lin Yang
    Fuli Zhong
    Hongbo Chen
    Xiangxue Li
    Applied Intelligence, 2023, 53 : 3183 - 3206
  • [44] Anomaly-Based Intrusion Detection of Protocol-Aware Jamming
    Lichtman, Marc
    Reed, Jeffrey H.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 269 - 274
  • [45] A Genetic Clustering Technique for Anomaly-Based Intrusion Detection Systems
    Aissa, Naila Belhadj
    Guerroumi, Mohamed
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 87 - 92
  • [46] Anomaly-Based Intrusion Detection System for Ad hoc Networks
    Korba, Abdelaziz Amara
    Nafaa, Mehdi
    Ghamri-Doudane, Yacine
    2016 7TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2016,
  • [47] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [48] Anomaly-Based Risk Detection Using Digital News Articles
    Pointner, Andreas
    Spitzer, Eva-Maria
    Krauss, Oliver
    Stoeckl, Andreas
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 1, 2023, 542 : 1 - 16
  • [49] An anomaly-based approach for DDoS attack detection in cloud environment
    Rawashdeh, Adnan
    Alkasassbeh, Mouhammd
    Al-Hawawreh, Muna
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2018, 57 (04) : 312 - 324
  • [50] Measuring normality in HTTP traffic for anomaly-based intrusion detection
    Estévez-Tapiador, JM
    García-Teodoro, P
    Díaz-Verdejo, JE
    COMPUTER NETWORKS, 2004, 45 (02) : 175 - 193