An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection

被引:0
|
作者
Pao, Hsing-Kuo [1 ]
Mao, Ching-Hao [2 ]
Lee, Hahn-Ming [1 ,3 ]
Chen, Chi-Dong [1 ]
Faloutsos, Christos [4 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 106, Taiwan
[2] Inst Informat Ind, Taipei 106, Taiwan
[3] Acad Sinica, Inst Informat Sci, Taipei 115, Taiwan
[4] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15232 USA
关键词
intrusion detection; alert correlation; correlation graph; attack graph; dissimilarity measure; Markov chain; data driven; Isomap; manifold learning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a graphical signature for intrusion detection given alert sequences. By correlating alerts with their temporal proximity, we build a probabilistic graph-based model to describe a group of alerts that form an attack or normal behavior. Using the models, we design a pairwise measure based on manifold learning to measure the dissimilarities between different groups of alerts. A large dissimilarity implies different behaviors between the two groups of alerts. Such measure can therefore be combined with regular classification methods for intrusion detection. The proposed method makes the following contributions: (a) It automatically identifies groups of alerts that are frequent; (b) It summarizes them into a suspicious sequence of activity, representing them with graph structures; (c) It suggests a novel graph-based dissimilarity measure. We evaluate our framework mainly on Acer 2007, a private dataset gathered from a well-known Security Operation Center in Taiwan. The performance on the real data suggests that the proposed method can achieve high detection performance in attack coverage and tolerant the attack variations. No need for privacy information as the input makes the method easy to plug into existing system such as an intrusion detector. Moreover, the graphical structures and the representation from manifold learning naturally provide the visualized result suitable for further analysis from domain experts.
引用
收藏
页码:243 / 262
页数:20
相关论文
共 50 条
  • [31] Alert verification based on attack classification in collaborative intrusion detection
    Xiao, Min
    Xiao, Debao
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 739 - +
  • [32] Intrusion alert correlation based on D-S evidence theory
    Mei Haibin
    Gong Han
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 308 - 312
  • [33] Intrusion Alert Correlation Based on UFP-Growth & Genetic Algorithm
    Jawdekar, Anand
    Richariya, Vineet
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (09): : 50 - 53
  • [34] Application of anomaly detection in alert correlation analysis
    Wang, Juan
    Qin, Zhi-Guang
    Ye, Li
    Jin, Jing
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2009, 10 (03): : 278 - 280
  • [35] Incident Reaction Based on Intrusion Detections' Alert Analysis
    Heigl, Michael
    Doerr, Laurin
    Almaini, Amar
    Fiala, Dalibor
    Schramm, Martin
    2018 23RD INTERNATIONAL CONFERENCE ON APPLIED ELECTRONICS (AE), 2018, : 45 - 50
  • [36] Analysis of update delays in signature-based network intrusion detection systems
    Gascon, Hugo
    Orfila, Agustin
    Blasco, Jorge
    COMPUTERS & SECURITY, 2011, 30 (08) : 613 - 624
  • [37] An Innovative Framework for Collaborative Intrusion Alert Correlation
    Elshoush, Huwaida Tagelsir Ibrahim
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 607 - 614
  • [38] Alert prioritization in intrusion detection systems
    Alsubhi, Khahd
    Al-Shaer, Ehab
    Boutaba, Raouf
    2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 33 - 40
  • [39] A flexible approach to intrusion alert anonymization and correlation
    Xu, Dingbang
    Ning, Peng
    2006 SECURECOMM AND WORKSHOPS, 2006, : 154 - +
  • [40] Signature Based Semantic Intrusion Detection System on Cloud
    Sangeetha, S.
    Devi, B. Gayathri
    Ramya, R.
    Dharani, M. K.
    Sathya, P.
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 657 - 666