An Effecient Method for Evaluating Alerts of Intrusion Detection Systems

被引:0
|
作者
Chakir, El Mostapha [1 ]
Moughit, Mohamed [1 ]
Idrissi Khamlichi, Youness [1 ,2 ]
机构
[1] Fac Sci & Technol UH1, Lab Comp Networks Mobil & Modeling IR2M, Settat, Morocco
[2] Natl Sch Appl Sci USMBA, Lab Renewable Energies & Intelligent Syst LERS, Fes, Morocco
关键词
Intrusion detection; Risk Assessment; Alerts prioritization; false positive; Alerts; Reliability; KDD cup 99; PRIORITIZATION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With thousands of alerts identified by IDSs every day, the process of distinguishing which alerts are important (i.e., true positives) and which are is irrelevant (i.e., false positives) is become more complicated. The security administrator must analyze each single alert either a true of false alert. This paper proposes an alert prioritization model, which is based on risk assessment. The model uses indicators, such as priority, reliability, asset value, as decision factors to calculate alert's risk. The objective is to determine the impact of certain alerts generated by IDS on the security status of an information system, also improve the detection of intrusions using snort by classifying the most critical alerts by their levels of risk, thus, only the alerts that presents a real threat will be displayed to the security administrator, so, we reduce the number of false positives, also we minimize the analysis time of the alerts. The model was evaluated using KDD Cup 99 Dataset as test environment and a pattern matching algorithm.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Evaluating credibility of shared messages among cooperative intrusion detection systems
    Su, H
    Ju, JB
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 395 - 400
  • [32] Evaluating Performance of Intrusion Detection Systems under Different Configurations in SDN
    Yeom, Dennis
    Niknami, Nadia
    Wu, Jie
    [J]. PROCEEDINGS OF THE 2023 INTERNATIONAL SYMPOSIUM ON THEORY, ALGORITHMIC FOUNDATIONS, AND PROTOCOL DESIGN FOR MOBILE NETWORKS AND MOBILE COMPUTING, MOBIHOC 2023, 2023, : 418 - 423
  • [33] An approach to generating testing traffic in evaluating network intrusion detection systems
    Huang, K
    Zhang, DF
    Yang, XD
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS, AND INFORMATICS, VOL XVI, PROCEEDINGS, 2004, : 511 - 515
  • [34] A Dataset for Evaluating Intrusion Detection Systems in IEEE 802.11 Wireless Networks
    Vilela, Douglas W. F. L.
    Ferreira, Ed' Wilson T.
    Shinoda, Ailton Akira
    Araujo, Nelcileno V. de Souza
    de Oliveira, Ruy
    Nascimento, Valtemir E.
    [J]. 2014 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2014,
  • [35] Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems
    Kelson Carvalho Santos
    Rodrigo Sanches Miani
    Flávio de Oliveira Silva
    [J]. Journal of Network and Systems Management, 2024, 32
  • [36] A hybrid method to intrusion detection systems using HMM
    Raman, C
    Negi, A
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 389 - 396
  • [37] Moving Dispersion Method for Statistical Anomaly Detection in Intrusion Detection Systems
    Golic, Jovan Dj.
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (02): : 71 - 90
  • [38] Detection and Update Method for Attack Behavior Models in Intrusion Detection Systems
    Bin Ahmadon, Mohd Anuaruddin
    Yamaguchi, Shingo
    Gou, Zhaolong
    Gupta, B. B.
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2119 - 2124
  • [39] A comprehensive approach to detect unknown attacks via intrusion detection alerts
    Song, Jungsuk
    Ohba, Hayato
    Takakura, Hiroki
    Okabe, Yasuo
    Ohira, Kenji
    Kwon, Yongjin
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 247 - +
  • [40] Managing intrusion-detection alerts based on fuzzy comprehensive evaluation
    Mu, CP
    Huang, HK
    Tian, SF
    [J]. Proceedings of the 8th Joint Conference on Information Sciences, Vols 1-3, 2005, : 140 - 143