An Effecient Method for Evaluating Alerts of Intrusion Detection Systems

被引:0
|
作者
Chakir, El Mostapha [1 ]
Moughit, Mohamed [1 ]
Idrissi Khamlichi, Youness [1 ,2 ]
机构
[1] Fac Sci & Technol UH1, Lab Comp Networks Mobil & Modeling IR2M, Settat, Morocco
[2] Natl Sch Appl Sci USMBA, Lab Renewable Energies & Intelligent Syst LERS, Fes, Morocco
关键词
Intrusion detection; Risk Assessment; Alerts prioritization; false positive; Alerts; Reliability; KDD cup 99; PRIORITIZATION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With thousands of alerts identified by IDSs every day, the process of distinguishing which alerts are important (i.e., true positives) and which are is irrelevant (i.e., false positives) is become more complicated. The security administrator must analyze each single alert either a true of false alert. This paper proposes an alert prioritization model, which is based on risk assessment. The model uses indicators, such as priority, reliability, asset value, as decision factors to calculate alert's risk. The objective is to determine the impact of certain alerts generated by IDS on the security status of an information system, also improve the detection of intrusions using snort by classifying the most critical alerts by their levels of risk, thus, only the alerts that presents a real threat will be displayed to the security administrator, so, we reduce the number of false positives, also we minimize the analysis time of the alerts. The model was evaluated using KDD Cup 99 Dataset as test environment and a pattern matching algorithm.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] A comprehensive approach to detect unknown attacks via intrusion detection alerts
    Song, Jungsuk
    Ohba, Hayato
    Takakura, Hiroki
    Okabe, Yasuo
    Ohira, Kenji
    Kwon, Yongjin
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 247 - +
  • [42] Managing intrusion-detection alerts based on fuzzy comprehensive evaluation
    Mu, CP
    Huang, HK
    Tian, SF
    [J]. Proceedings of the 8th Joint Conference on Information Sciences, Vols 1-3, 2005, : 140 - 143
  • [43] Improving Usability and Intrusion Detection Alerts in a Home Video Surveillance System
    Jose Abasolo, Maria
    Sebastian Castaneda, Carlos
    [J]. COMPUTER SCIENCE - CACIC 2020, 2021, 1409 : 350 - 364
  • [44] A Rough Set Based Alerts Aggregation and Correlation Model for Intrusion Detection
    Zhou, Lin
    Wang, Chunping
    Jiang, Feng
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND INFORMATION (TEIN 2012), 2012, : 27 - 33
  • [45] Real-time analysis of intrusion detection alerts via correlation
    Lee, Soojin
    Chung, Byungchun
    Kim, Heeyoul
    Lee, Yunho
    Park, Chanil
    Yoon, Hyunsoo
    [J]. COMPUTERS & SECURITY, 2006, 25 (03) : 169 - 183
  • [46] Handling Alerts for Intrusion Detection System Using Stateful Pattern Matching
    Chakir, El Mostapha
    Idrissi Khamlichi, Youness
    Moughit, Mohamed
    [J]. 2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 139 - 144
  • [47] An Alerts Correlation Technology for Large-Scale Network Intrusion Detection
    Yuan, Jingbo
    Ding, Shunli
    [J]. WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 352 - +
  • [48] INTRUSION DETECTION SYSTEMS
    WILLIAMS, JD
    [J]. TRANSACTIONS OF THE AMERICAN NUCLEAR SOCIETY, 1979, 33 (NOV): : 733 - 734
  • [49] Evaluating the impact of filter-based feature selection in intrusion detection systems
    Houssam Zouhri
    Ali Idri
    Ahmed Ratnani
    [J]. International Journal of Information Security, 2024, 23 : 759 - 785
  • [50] Evaluating the impact of filter-based feature selection in intrusion detection systems
    Zouhri, Houssam
    Idri, Ali
    Ratnani, Ahmed
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 759 - 785