A language driven intrusion detection system for event and alert correlation

被引:0
|
作者
Totel, E [1 ]
Vivinis, B [1 ]
Mé, L [1 ]
机构
[1] Supelec, F-35511 Cesson Sevigne, France
关键词
intrusion detection; event correlation; alert correlation; attack signature recognition; site security monitoring;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is well known that security prevention mechanisms are not sufficient to protect efficiently an information system. Intrusion detection systems are required. But these systems present many imperfections. In particular, they can either generate false positives (i.e., alarms that should not be produced) or miss attacks (false negatives). However, the main problem is the generation of false positives that can overwhelm the information system administrator. In this paper, we follow the notion of correlation proposed by others. The objective is to aim at correlating either events in the analyser or alerts in the manager. We first present the ADeLe language, which provides a way to define the correlation properties. Then we present which algorithms have been carried out in our IDS to handle ADeLe signatures. Finally, we show the stress tests that have been applied to the probe algorithms that we have implemented.
引用
收藏
页码:209 / 224
页数:16
相关论文
共 50 条
  • [1] Applying alert correlation method in network intrusion detection system
    Li, WJ
    Zhang, DF
    Yang, XD
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS, AND INFORMATICS, VOL XVI, PROCEEDINGS, 2004, : 516 - 521
  • [2] Alert correlation analysis in intrusion detection
    Shin, Moon Sun
    Jeong, Kyeong Ja
    [J]. ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2006, 4093 : 1049 - 1056
  • [3] A comprehensive approach to intrusion detection alert correlation
    Valeur, F
    Vigna, G
    Kruegel, C
    Kemmerer, RA
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (03) : 146 - 169
  • [4] Alert correlation in a cooperative intrusion detection framework
    Cuppens, F
    Miège, A
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 202 - 215
  • [5] Event Correlation for Intrusion Detection Systems
    Dwivedi, Neelam
    Tripathi, Aprna
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 133 - 139
  • [6] Alert Correlation for Cyber-Manufacturing Intrusion Detection
    Wu, Mingtao
    Moon, Young
    [J]. 47TH SME NORTH AMERICAN MANUFACTURING RESEARCH CONFERENCE (NAMRC 47), 2019, 34 : 820 - 831
  • [7] Survey on alert correlation methods in distributed intrusion detection
    Sun, Jingru
    Dong, Xiaomei
    Yu, Ge
    [J]. Jisuanji Gongcheng/Computer Engineering, 2005, 31 (07): : 58 - 59
  • [8] TRINETR: An intrusion detection alert management system
    Yu, JQ
    Reddy, YVR
    Selliah, S
    Kankanahalli, S
    Reddy, S
    Bharadwaj, V
    [J]. THIRTEENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2004, : 235 - 240
  • [9] Survey of intrusion-detection alert aggregation and correlation techniques
    School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
    [J]. Jisuanji Yanjiu yu Fazhan, 2006, 1 (1-8):
  • [10] An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection
    Pao, Hsing-Kuo
    Mao, Ching-Hao
    Lee, Hahn-Ming
    Chen, Chi-Dong
    Faloutsos, Christos
    [J]. INTERNATIONAL CONFERENCE ON TECHNOLOGIES AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE (TAAI 2010), 2010, : 102 - 109