An Effecient Method for Evaluating Alerts of Intrusion Detection Systems

被引:0
|
作者
Chakir, El Mostapha [1 ]
Moughit, Mohamed [1 ]
Idrissi Khamlichi, Youness [1 ,2 ]
机构
[1] Fac Sci & Technol UH1, Lab Comp Networks Mobil & Modeling IR2M, Settat, Morocco
[2] Natl Sch Appl Sci USMBA, Lab Renewable Energies & Intelligent Syst LERS, Fes, Morocco
关键词
Intrusion detection; Risk Assessment; Alerts prioritization; false positive; Alerts; Reliability; KDD cup 99; PRIORITIZATION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With thousands of alerts identified by IDSs every day, the process of distinguishing which alerts are important (i.e., true positives) and which are is irrelevant (i.e., false positives) is become more complicated. The security administrator must analyze each single alert either a true of false alert. This paper proposes an alert prioritization model, which is based on risk assessment. The model uses indicators, such as priority, reliability, asset value, as decision factors to calculate alert's risk. The objective is to determine the impact of certain alerts generated by IDS on the security status of an information system, also improve the detection of intrusions using snort by classifying the most critical alerts by their levels of risk, thus, only the alerts that presents a real threat will be displayed to the security administrator, so, we reduce the number of false positives, also we minimize the analysis time of the alerts. The model was evaluated using KDD Cup 99 Dataset as test environment and a pattern matching algorithm.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems
    Tian, Junfeng
    Liu, Tao
    Jiao, Hongqiang
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 592 - 598
  • [2] Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems
    Lanvin, Maxime
    Gimenez, Pierre-Francois
    Han, Yufei
    Majorczyk, Frederic
    Me, Ludovic
    Totel, Eric
    [J]. PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 135 - 150
  • [3] Alerts clustering for intrusion detection systems: Overview and machine learning perspectives
    Alhakami, Wajdi
    [J]. International Journal of Advanced Computer Science and Applications, 2019, 10 (05): : 573 - 582
  • [4] Alerts Clustering for Intrusion Detection Systems: Overview and Machine Learning Perspectives
    Alhakami, Wajdi
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (05) : 573 - 582
  • [5] Testing and evaluating computer intrusion detection systems
    Durst, R
    Champion, T
    Witten, B
    Miller, E
    Spagnuolo, L
    [J]. COMMUNICATIONS OF THE ACM, 1999, 42 (07) : 53 - 61
  • [6] A Comparative Study of Different Fuzzy Classifiers for Cloud Intrusion Detection Systems' Alerts
    Alqahtani, Saeed M.
    John, Robert
    [J]. PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [7] Critical episode mining in intrusion detection alerts
    Soleimani, Mahboobeh
    Ghorbani, Ali A.
    [J]. CNSR 2008: PROCEEDINGS OF THE 6TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2008, : 157 - 164
  • [8] A Novel Radial Visualization of Intrusion Detection Alerts
    Shi, Yang
    Zhao, Ying
    Zhou, Fangfang
    Shi, Ronghua
    Zhang, Yaoxue
    Wang, Guojun
    [J]. IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2018, 38 (06) : 83 - 95
  • [9] Improving the Quality of Alerts with Correlation in Intrusion Detection
    Salim, Lalla Fatima
    Mezrioui, Abdellatif
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (12): : 210 - 215
  • [10] Modeling network intrusion detection alerts for correlation
    Zhou, Jingmin
    Heckman, Mark
    Reynolds, Brennen
    Carlson, Adam
    Bishop, Matt
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (01)