A logic-based model to support alert correlation in intrusion detection

被引:54
|
作者
Morin, Benjamin [1 ]
Me, Ludovic [1 ]
Debar, Herve [2 ]
Ducasse, Mireille [3 ]
机构
[1] Supelec, F-35576 Cesson Sevigne, France
[2] Orange Labs, F-14066 Caen, France
[3] IRISA, F-35042 Rennes, France
关键词
Intrusion detection; Alert correlation; Data model;
D O I
10.1016/j.inffus.2009.01.005
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Managing and supervising security in large networks has become a challenging task, as new threats and flaws are being discovered on a daily basis. This requires an in depth and up-to-date knowledge of the context in which security-related events occur. Several tools have been proposed to support security operators in this task, each of which focuses on some specific aspects of the monitoring. Many alarm fusion and correlation approaches have also been investigated. However, most of these approaches suffer from two major drawbacks. First, they only take advantage of the information found in alerts, which is not sufficient to achieve the goals of alert correlation, that is to say to reduce the overall amount of alerts, while enhancing their semantics. Second, these techniques have been designed on an ad hoc basis and lack a shared data model that would allow them to reason about events in a cooperative way. In this paper, we propose a federative data model for security systems to query and assert knowledge about security incidents and the context in which they occur. This model constitutes a consistent and formal ground to represent information that is required to reason about complementary evidences, in order to confirm or invalidate alerts raised by intrusion detection systems. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:285 / 299
页数:15
相关论文
共 50 条
  • [1] Alert correlation analysis in intrusion detection
    Shin, Moon Sun
    Jeong, Kyeong Ja
    [J]. ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2006, 4093 : 1049 - 1056
  • [2] APPLICATION OF TYPE-2 FUZZY LOGIC TO RULE-BASED INTRUSION ALERT CORRELATION DETECTION
    Huang, Chenn-Jung
    Hu, Kai-Wen
    Chen, Heng-Ming
    Chang, Tao-Ku
    Luo, Yun-Cheng
    Lien, Yih-Jhe
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (04): : 2865 - 2874
  • [3] A comprehensive approach to intrusion detection alert correlation
    Valeur, F
    Vigna, G
    Kruegel, C
    Kemmerer, RA
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (03) : 146 - 169
  • [4] Alert correlation in a cooperative intrusion detection framework
    Cuppens, F
    Miège, A
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 202 - 215
  • [5] An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection
    Pao, Hsing-Kuo
    Mao, Ching-Hao
    Lee, Hahn-Ming
    Chen, Chi-Dong
    Faloutsos, Christos
    [J]. INTERNATIONAL CONFERENCE ON TECHNOLOGIES AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE (TAAI 2010), 2010, : 102 - 109
  • [6] An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection
    Pao, Hsing-Kuo
    Mao, Ching-Hao
    Lee, Hahn-Ming
    Chen, Chi-Dong
    Faloutsos, Christos
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (02) : 243 - 262
  • [7] Logic-based Reasoning Support for SBVR
    Solomakhin, Dmitry
    Franconi, Enrico
    Mosca, Alessandro
    [J]. FUNDAMENTA INFORMATICAE, 2013, 124 (04) : 543 - 560
  • [8] Alert Correlation for Cyber-Manufacturing Intrusion Detection
    Wu, Mingtao
    Moon, Young
    [J]. 47TH SME NORTH AMERICAN MANUFACTURING RESEARCH CONFERENCE (NAMRC 47), 2019, 34 : 820 - 831
  • [9] RETRACTED: Temporal Logic-Based Artificial Immune System for Intrusion Detection (Retracted Article)
    Chen, Xiyue
    Pang, Jianmin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [10] FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems
    Alsubhi, Khalid
    Aib, Issam
    Boutaba, Raouf
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2012, 22 (04) : 263 - 284