An Effecient Method for Evaluating Alerts of Intrusion Detection Systems

被引:0
|
作者
Chakir, El Mostapha [1 ]
Moughit, Mohamed [1 ]
Idrissi Khamlichi, Youness [1 ,2 ]
机构
[1] Fac Sci & Technol UH1, Lab Comp Networks Mobil & Modeling IR2M, Settat, Morocco
[2] Natl Sch Appl Sci USMBA, Lab Renewable Energies & Intelligent Syst LERS, Fes, Morocco
关键词
Intrusion detection; Risk Assessment; Alerts prioritization; false positive; Alerts; Reliability; KDD cup 99; PRIORITIZATION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With thousands of alerts identified by IDSs every day, the process of distinguishing which alerts are important (i.e., true positives) and which are is irrelevant (i.e., false positives) is become more complicated. The security administrator must analyze each single alert either a true of false alert. This paper proposes an alert prioritization model, which is based on risk assessment. The model uses indicators, such as priority, reliability, asset value, as decision factors to calculate alert's risk. The objective is to determine the impact of certain alerts generated by IDS on the security status of an information system, also improve the detection of intrusions using snort by classifying the most critical alerts by their levels of risk, thus, only the alerts that presents a real threat will be displayed to the security administrator, so, we reduce the number of false positives, also we minimize the analysis time of the alerts. The model was evaluated using KDD Cup 99 Dataset as test environment and a pattern matching algorithm.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices
    Milenkoski, Aleksandar
    Vieira, Marco
    Kounev, Samuel
    Avritzer, Alberto
    Payne, Bryan D.
    [J]. ACM COMPUTING SURVEYS, 2015, 48 (01)
  • [22] A Wireless Intrusion Alerts Clustering Method for Mobile Internet
    Chen Guanlin
    Wu Ying
    [J]. CHINA COMMUNICATIONS, 2016, 13 (04) : 108 - 118
  • [23] Frequency-Based Representation of Massive Alerts and Combination of Indicators by Heterogeneous Intrusion Detection Systems for Anomaly Detection
    Park, Hyunjae
    Choi, Young-June
    [J]. SENSORS, 2022, 22 (12)
  • [24] A Comparative Analysis of Different Classification Techniques for Cloud Intrusion Detection Systems' Alerts and Fuzzy Classifiers
    Alqahtani, Saeed M.
    John, Robert
    [J]. 2017 COMPUTING CONFERENCE, 2017, : 406 - 415
  • [25] Processing Intrusion Detection Alerts in Large-scale Network
    Li, Dong
    Li, Zhitang
    Ma, Jie
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 545 - 548
  • [26] SOM and PSO Based Alerts Clustering in Intrusion Detection System
    Jing Yongwen
    Li Lifen
    [J]. FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY III, PTS 1-3, 2013, 401 : 1453 - 1457
  • [27] Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts
    Moskal, Stephen
    Yang, Shanchieh Jay
    Kuhl, Michael E.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 49 - 54
  • [28] MELODY: SYNTHESIZED DATASETS FOR EVALUATING INTRUSION DETECTION SYSTEMS FOR THE SMART GRID
    Babu, Vignesh
    Kumar, Rakesh
    Hoang Hai Nguyen
    Nicol, David M.
    Palani, Kartik
    Reed, Elizabeth
    [J]. 2017 WINTER SIMULATION CONFERENCE (WSC), 2017, : 1061 - 1072
  • [29] Evaluating Network Intrusion Detection Systems for High-Speed Networks
    Hu, Qinwen
    Asghar, Muhammad Rizwan
    Brownlee, Nevil
    [J]. 2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2017, : 402 - 407
  • [30] Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems
    Santos, Kelson Carvalho
    Miani, Rodrigo Sanches
    Silva, Flavio de Oliveira
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (02)