Real-time correlation of network security alerts

被引:14
|
作者
Li, Zhitang [1 ]
Zhang, Aifang [1 ]
Lei, Jie [1 ]
Wang, Li [1 ]
机构
[1] Huazhong Univ Sci & Technol, Dept Comp, Wuhan 430074, Peoples R China
关键词
D O I
10.1109/ICEBE.2007.69
中图分类号
F [经济];
学科分类号
02 ;
摘要
With the growing deployment of network security devices, it becomes a great challenge to manage the large volume of security alerts from these devices. In this paper a novel method using sequential pattern mining algorithm is applied to discover complicated multistage attack behavior patterns. Their result can be transformed into rules automatically. In contrast with other approaches, it overcomes the drawback of high dependence on precise attack specifications and accurate rule definitions. Based on the algorithms, a real-time alert correlation system is proposed to detect an ongoing attack and predict the upcoming next step of a multistage attack in real time. Consequently, network administrator can be aware of the threat as soon as possible and take deliberate action to prevent the target of, an attack from further compromise. We implement the system and valid our method by a series of experiments with test dataset and in real network environment. The result shows the effectivity of the system in discovery and predication of attacks.
引用
收藏
页码:73 / +
页数:3
相关论文
共 50 条
  • [1] Real-time analysis of intrusion detection alerts via correlation
    Lee, Soojin
    Chung, Byungchun
    Kim, Heeyoul
    Lee, Yunho
    Park, Chanil
    Yoon, Hyunsoo
    [J]. COMPUTERS & SECURITY, 2006, 25 (03) : 169 - 183
  • [2] AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts
    Husak, Martin
    Kaspar, Jaroslav
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [3] Visual firewall: Real-time network security monitor
    Lee, CP
    Trost, J
    Gibbs, N
    Beyah, R
    Copeland, JA
    [J]. IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, 2005, : 129 - 136
  • [4] A dynamic authentication mechanism for real-time network security
    Bossie, Craig
    Fiorini, Pierre A.
    [J]. 2005 IEEE INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2005, : 360 - 365
  • [5] REAL-TIME NETWORK SECURITY MONITORING, ASSESSMENT AND OPTIMIZATION
    WU, FF
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 1988, 10 (02) : 83 - 100
  • [6] NetSecRadar: A Real-Time Visualization System for Network Security
    Zhao, Ying
    Zhou, Fangfang
    Shi, Ronghua
    [J]. 2012 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2012, : 281 - 282
  • [7] A real-time intrusion detection algorithm for network security
    El-Bakry, Hazem M.
    Mastorakis, Nikos
    [J]. 2008, WSEAS (07):
  • [8] A Real-Time Intrusion Detection Algorithm for Network Security
    El-Bakry, Hazem M.
    Mastorakis, Nikos
    [J]. PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS, PTS I AND II: NEW ASPECTS OF APPLIED INFORMATICS AND COMMUNICATIONS, 2008, : 533 - +
  • [9] A DISTRIBUTED REAL-TIME EVENT CORRELATION ARCHITECTURE FOR SCADA SECURITY
    Deng, Yi
    Shukla, Sandeep
    [J]. CRITICAL INFRASTRUCTURE PROTECTION VII, 2013, 417 : 81 - 93
  • [10] The Research of Security and Real-Time Based on the Control Information Network
    Su Xiao-hui
    Xu Shu-Ping
    [J]. INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768