Event Correlation for Intrusion Detection Systems

被引:8
|
作者
Dwivedi, Neelam [1 ]
Tripathi, Aprna [2 ]
机构
[1] MNNIT Allahabad, Dept Comp Sci & Engn, Allahabad, Uttar Pradesh, India
[2] Mangalayatan Univ, Inst Comp Applicat, Aligarh, Uttar Pradesh, India
关键词
IDS; SEC; DARPA; events; Correlation;
D O I
10.1109/CICT.2015.111
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection System (IDS) have grown into a mature and feature rich technology that provides advanced features to detect intrusion and provide responses. It also allows the management system for security analysis by monitoring, configuring and analyzing the intrusion data. A better understanding of alerts by using a general framework and infrastructure for detecting intrusions through event correlation strategy minimizes the amount of data generated. Event correlation techniques are needed for two reasons. First, network attack detection is usually based on information or data received from distributed sensors, e.g. intrusion detection systems. During attacks, the generated amount of events is hard to handle and so it is difficult to evaluate the current attack situation for a larger network. Thus, the concept of event or alert correlation has been introduced. Event correlation paints a picture of what is now being called as network or cyber situational awareness and tries to guide the security administrator on the actions that he can take to mitigate the crisis. The aim of the event correlation for intrusion detection system (IDS) is to improve security by correlating events and reduce the workload on an IDS analyst. This correlation has been achieved by getting together similar alerts, thus allowing the analyst to only look at a few alerts instead of hundreds or thousands of alerts. In this paper, we correlate the results of SNORT Intrusion Detection System (IDS) with SEC (Simple Event Correlator) by taking the input from the MIT DARPA (Defense advanced Research Projects Agency) dataset. The alerts generated from Snort are very large and so it is difficult for the administrators to identify them. Here we correlate the alerts based on same name coming from different IP address. This correlation removes the duplication of alerts and thus reduces the information overload on the administrator.
引用
收藏
页码:133 / 139
页数:7
相关论文
共 50 条
  • [1] Intrusion detection in controlled discrete event systems
    Thorsley, David
    Teneketzis, Demosthenis
    [J]. PROCEEDINGS OF THE 45TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2006, : 6049 - +
  • [2] A language driven intrusion detection system for event and alert correlation
    Totel, E
    Vivinis, B
    Mé, L
    [J]. SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 209 - 224
  • [3] An intrusion detection method for host systems based on behavior correlation
    [J]. Wang, Y. (wangyinglong@sohu.com), 1600, Inst. of Scientific and Technical Information of China, 15 Fu-Xing Lu - P.O. Box 3829, Beijing, 100038, China (22):
  • [4] Exploiting diversity and correlation to improve the performance of intrusion detection systems
    Coppolino, L.
    D'Antonio, S.
    Esposito, M.
    Romano, L.
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 167 - +
  • [5] Towards probabilistic intrusion detection in supervisory control of discrete event systems
    Meira-Goes, Romulo
    Keroglou, Christoforos
    Lafortune, Stephane
    [J]. IFAC PAPERSONLINE, 2020, 53 (02): : 1776 - 1782
  • [6] Bayesian event classification for intrusion detection
    Kruegel, C
    Mutz, D
    Robertson, W
    Valeur, F
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 14 - 23
  • [7] Alert correlation in collaborative intelligent intrusion detection systems-A survey
    Elshoush, Huwaida Tagelsir
    Osman, Izzeldin Mohamed
    [J]. APPLIED SOFT COMPUTING, 2011, 11 (07) : 4349 - 4365
  • [8] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177
  • [9] Asynchronous alert correlation in multi-agent intrusion detection systems
    Gorodetsky, V
    Karsaev, O
    Samoilov, V
    Ulanov, A
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 366 - 379
  • [10] Intrusion detection systems
    [J]. IEEE Intelligent Systems and Their Applications, 2001, 16 (01):