A rule-based intrusion alert correlation system for integrated security management

被引:0
|
作者
Lee, SH [1 ]
Lee, HH
Noh, BN
机构
[1] Chonnam Natl Univ, Dept Comp Sci, Kwangju 500757, South Korea
[2] Wonkwang Univ, Div Informat & EC, Iksan 570749, South Korea
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As traditional host- and network-based IDSs are to detect a single intrusion based on log data or packet information respectively, they inherently generate a huge number of false alerts due to lack of information on interrelated alarms. In order to reduce the number of false alarms and then detect a real intrusion, a new alert analyzing system is needed. In this paper, we propose a rule-based alert correlation system to reduce the number of false alerts, correlate them, and decide which alerts are parts of the real attack. Our alert correlation system consists of an alert manager, an alert preprocessor, an alert correlator. An alert manager takes charge of storing filtered alerts into our alert database. An alert preprocessor reduces stored alerts to facilitate further correlation analysis. An alert correlator reports global attack plans.
引用
收藏
页码:365 / 372
页数:8
相关论文
共 50 条
  • [1] APPLICATION OF TYPE-2 FUZZY LOGIC TO RULE-BASED INTRUSION ALERT CORRELATION DETECTION
    Huang, Chenn-Jung
    Hu, Kai-Wen
    Chen, Heng-Ming
    Chang, Tao-Ku
    Luo, Yun-Cheng
    Lien, Yih-Jhe
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (04): : 2865 - 2874
  • [2] RULE-BASED SUPPORT FOR INTEGRATED SECURITY SYSTEMS
    Arthofer, Balazs
    Vakulya, Gergely
    Simon, Gyula
    [J]. MENDELL 2009, 2009, : 328 - 335
  • [3] Building agents for rule-based intrusion detection system
    Jha, S
    Hassan, M
    [J]. COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1366 - 1373
  • [4] An integrated rule-based and case-based reasoning system for customer service management
    An, LP
    Yan, JY
    Tong, LY
    [J]. ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 266 - 273
  • [5] Rule-Based Auditing System for Software Security Assurance
    Jang, Changbok
    Kim, Jeongseok
    Jang, Hyokyung
    Park, Sundo
    Jang, Bokman
    Kim, Bonghoi
    Choi, Euiin
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2009, : 198 - +
  • [6] An alert fusion mechanism based on alert class association in intrusion management system
    Zhu, Ran Li Xu
    Yang, Yixian
    Jing, Bo
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE: 50 YEARS' ACHIEVEMENTS, FUTURE DIRECTIONS AND SOCIAL IMPACTS, 2006, : 608 - 611
  • [7] A fuzzy rule-based management system for lifts
    EL Zawawi, A
    Morsy, I
    [J]. PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 926 - 929
  • [8] A Novel Rule-based Intrusion Detection System Using Data Mining
    Li, Lei
    Yang, De-Zhang
    Shen, Fang-Cheng
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 169 - 172
  • [9] Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System
    Fries, Terrence P.
    [J]. WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 172 - 177
  • [10] Rule-Based Inferential System for Microgrid Energy Management System
    Kurukuru, Varaha Satya Bharath
    Haque, Ahteshamul
    Padmanaban, Sanjeevikumar
    Khan, Mohammed Ali
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1582 - 1591