Analyzing intensive intrusion alerts via correlation

被引:0
|
作者
Ning, P [1 ]
Cui, Y [1 ]
Reeves, DS [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
intrusion detection; alert correlation; attack scenario analysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections. between them. In situations where there are intensive intrusions, not only will. actual alerts be mixed with false alerts, but the amount of alerts will also become unmanageable. As a result, it is difficult for human users or intrusion response systems to understand the alerts and take appropriate actions. Several complementary alert correlation methods have been proposed to address this problem. As one of these methods, we have developed a framework to correlate intrusion alerts using prerequisites of intrusions. In this paper, we continue this work to study the feasibility of this method in analyzing real-world, intensive intrusions. In particular, we develop three utilities (called adjustable graph reduction, focused analysis, and graph decomposition) to facilitate the analysis of large sets of correlated alerts. We study the effectiveness of the alert correlation method and these utilities through a case study with the network traffic captured at the DEF CON 8 Capture the Flag (CTF) event. Our results show that these utilities can simplify the analysis of large amounts of alerts, and also reveals several attack strategies that were repeatedly used in the DEF CON 8 CTF event.
引用
收藏
页码:74 / 94
页数:21
相关论文
共 50 条
  • [1] Real-time analysis of intrusion detection alerts via correlation
    Lee, Soojin
    Chung, Byungchun
    Kim, Heeyoul
    Lee, Yunho
    Park, Chanil
    Yoon, Hyunsoo
    [J]. COMPUTERS & SECURITY, 2006, 25 (03) : 169 - 183
  • [2] Preprocessor of Intrusion Alerts Correlation Based on Ontology
    Li, Wan
    Tian, Shengfeng
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 460 - +
  • [3] Improving the Quality of Alerts with Correlation in Intrusion Detection
    Salim, Lalla Fatima
    Mezrioui, Abdellatif
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (12): : 210 - 215
  • [4] Modeling network intrusion detection alerts for correlation
    Zhou, Jingmin
    Heckman, Mark
    Reynolds, Brennen
    Carlson, Adam
    Bishop, Matt
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (01)
  • [5] Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection
    Mallissery, Sanoop
    Praveen, K.
    Sathar, Shahana
    [J]. COMPUTATIONAL INTELLIGENCE AND INFORMATION TECHNOLOGY, 2011, 250 : 662 - +
  • [6] Intrusion Alerts Correlation Model Based on XSWRL Ontology
    Li, Wan
    Zhu, Yan
    Tian, Shengfeng
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL I, PROCEEDINGS, 2008, : 894 - 898
  • [7] Enhancing the content of the intrusion alerts using logic correlation
    Wang, LM
    Ma, JF
    Zhan, YZ
    [J]. CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 137 - 142
  • [8] An ontology-based intrusion alerts correlation system
    Li, Wan
    Tian, Shengfeng
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (10) : 7138 - 7146
  • [9] A Rough Set Based Alerts Aggregation and Correlation Model for Intrusion Detection
    Zhou, Lin
    Wang, Chunping
    Jiang, Feng
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND INFORMATION (TEIN 2012), 2012, : 27 - 33
  • [10] An Alerts Correlation Technology for Large-Scale Network Intrusion Detection
    Yuan, Jingbo
    Ding, Shunli
    [J]. WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 352 - +