An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection

被引:0
|
作者
Pao, Hsing-Kuo [1 ]
Mao, Ching-Hao [2 ]
Lee, Hahn-Ming [1 ,3 ]
Chen, Chi-Dong [1 ]
Faloutsos, Christos [4 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 106, Taiwan
[2] Inst Informat Ind, Taipei 106, Taiwan
[3] Acad Sinica, Inst Informat Sci, Taipei 115, Taiwan
[4] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15232 USA
关键词
intrusion detection; alert correlation; correlation graph; attack graph; dissimilarity measure; Markov chain; data driven; Isomap; manifold learning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a graphical signature for intrusion detection given alert sequences. By correlating alerts with their temporal proximity, we build a probabilistic graph-based model to describe a group of alerts that form an attack or normal behavior. Using the models, we design a pairwise measure based on manifold learning to measure the dissimilarities between different groups of alerts. A large dissimilarity implies different behaviors between the two groups of alerts. Such measure can therefore be combined with regular classification methods for intrusion detection. The proposed method makes the following contributions: (a) It automatically identifies groups of alerts that are frequent; (b) It summarizes them into a suspicious sequence of activity, representing them with graph structures; (c) It suggests a novel graph-based dissimilarity measure. We evaluate our framework mainly on Acer 2007, a private dataset gathered from a well-known Security Operation Center in Taiwan. The performance on the real data suggests that the proposed method can achieve high detection performance in attack coverage and tolerant the attack variations. No need for privacy information as the input makes the method easy to plug into existing system such as an intrusion detector. Moreover, the graphical structures and the representation from manifold learning naturally provide the visualized result suitable for further analysis from domain experts.
引用
收藏
页码:243 / 262
页数:20
相关论文
共 50 条
  • [1] An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection
    Pao, Hsing-Kuo
    Mao, Ching-Hao
    Lee, Hahn-Ming
    Chen, Chi-Dong
    Faloutsos, Christos
    [J]. INTERNATIONAL CONFERENCE ON TECHNOLOGIES AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE (TAAI 2010), 2010, : 102 - 109
  • [2] Alert correlation analysis in intrusion detection
    Shin, Moon Sun
    Jeong, Kyeong Ja
    [J]. ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2006, 4093 : 1049 - 1056
  • [3] A comprehensive approach to intrusion detection alert correlation
    Valeur, F
    Vigna, G
    Kruegel, C
    Kemmerer, RA
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (03) : 146 - 169
  • [4] Alert correlation in a cooperative intrusion detection framework
    Cuppens, F
    Miège, A
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 202 - 215
  • [5] A logic-based model to support alert correlation in intrusion detection
    Morin, Benjamin
    Me, Ludovic
    Debar, Herve
    Ducasse, Mireille
    [J]. INFORMATION FUSION, 2009, 10 (04) : 285 - 299
  • [6] Alert Correlation for Cyber-Manufacturing Intrusion Detection
    Wu, Mingtao
    Moon, Young
    [J]. 47TH SME NORTH AMERICAN MANUFACTURING RESEARCH CONFERENCE (NAMRC 47), 2019, 34 : 820 - 831
  • [7] Survey on alert correlation methods in distributed intrusion detection
    Sun, Jingru
    Dong, Xiaomei
    Yu, Ge
    [J]. Jisuanji Gongcheng/Computer Engineering, 2005, 31 (07): : 58 - 59
  • [8] Intrusion alert prioritisation and attack detection using post-correlation analysis
    Shittu, Riyanat
    Healing, Alex
    Ghanea-Hercock, Robert
    Bloomfield, Robin
    Rajarajan, Muttukrishnan
    [J]. COMPUTERS & SECURITY, 2015, 50 : 1 - 15
  • [9] Survey of intrusion-detection alert aggregation and correlation techniques
    School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
    [J]. Jisuanji Yanjiu yu Fazhan, 2006, 1 (1-8):
  • [10] Applying alert correlation method in network intrusion detection system
    Li, WJ
    Zhang, DF
    Yang, XD
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS, AND INFORMATICS, VOL XVI, PROCEEDINGS, 2004, : 516 - 521