Stream clustering guided supervised learning for classifying NIDS alerts

被引:4
作者
Vaarandi, Risto [1 ]
Guerra-Manzanares, Alejandro [2 ]
机构
[1] Tallinn Univ Technol, Ctr Digital Forens & Cyber Secur, Tallinn, Estonia
[2] New York Univ Abu Dhabi, Ctr Interacting Urban Networks, Abu Dhabi, U Arab Emirates
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2024年 / 155卷
关键词
Network security; Intrusion detection; Network Intrusion Detection System; IDS; NIDS; NIDS alert; High-priority NIDS alert; NIDS alert classification; Supervised learning; Small training data set; Stream clustering; Data set generation; Data labeling; Security Operations Center; SOC; Workload reduction;
D O I
10.1016/j.future.2024.01.032
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A Network Intrusion Detection System (NIDS) is a network monitoring technology for identifying cyber attacks, botnet command and control traffic, and other unwanted network activity. Unfortunately, organizational NIDS solutions can often generate tens or hundreds of thousands of alerts on a daily basis, with a significant part of them having low importance or being false positives. Therefore, high priority alerts become hard to spot, which overloads security analysts and complicates their work. The current paper addresses this problem and introduces a machine learning framework for classifying NIDS alerts with the help of stream clustering and supervised learning. We propose a stream -clustering -guided method for creating labeled NIDS alert data sets. The small data sets created using this method can be used for training high-performance supervised NIDS alert classifiers. This significantly reduces the human labeling effort and eases the application of supervised machine learning for NIDS alert classification. The proposed machine learning framework was evaluated on NIDS alerts collected over 2 months from the network of a large academic organization. The experimental results indicate that combining stream clustering and supervised learning into a NIDS alert classification framework significantly decreases the number of false positives, and thus reduces the workload of human security analysts. The framework also features low CPU time and memory consumption and can thus be run on commodity hardware. In conclusion, the proposed framework provides a cost-effective means of integrating machine learning into Security Operation Centers (SOCs). This enables the identification of critical NIDS alerts using high-performance classifiers, thereby assisting in the automation of alert handling tasks for SOC personnel. To address the lack of public data sets in the problem domain and foster further research, we publicly share the large labeled NIDS alert data set used in our experimental setup.
引用
收藏
页码:231 / 244
页数:14
相关论文
共 30 条
[1]   Intrusion detection alarms reduction using root cause analysis and clustering [J].
Al-Mamory, Safaa O. ;
Zhang, Hongli .
COMPUTER COMMUNICATIONS, 2009, 32 (02) :419-430
[2]   An efficient malware detection approach with feature weighting based on Harris Hawks optimization [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Al-Zoubi, Ala' M. ;
Hassonah, Mohammad A. ;
Kose, Utku .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04) :2369-2387
[3]   The Role of Machine Learning in Cybersecurity [J].
Apruzzese, Giovanni ;
Laskov, Pavel ;
de Oca, Edgardo Montes ;
Mallouli, Wissam ;
Rapa, Luis Burdalo ;
Grammatopoulos, Athanasios Vasileios ;
Di Franco, Fabio .
DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01)
[4]   Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response [J].
Ban, Tao ;
Takahashi, Takeshi ;
Ndichu, Samuel ;
Inoue, Daisuke .
APPLIED SCIENCES-BASEL, 2023, 13 (11)
[5]   Combat Security Alert Fatigue with AI-Assisted Techniques [J].
Ban, Tao ;
Samuel, Ndichu ;
Takahashi, Takeshi ;
Inoue, Daisuke .
PROCEEDINGS OF 14TH WORKSHOP ON CYBER SECURITY EXPERIMENTATION AND TEST (CSET 2021), 2021, :9-16
[6]   ILAB: An Interactive Labelling Strategy for Intrusion Detection [J].
Beaugnon, Anael ;
Chifflier, Pierre ;
Bach, Francis .
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017), 2017, 10453 :120-140
[7]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[8]  
Cisco, 2023, Snort
[9]  
Cisco, 2023, secure IPS (NGIPS)
[10]  
Deutsche telekom security, 2022, T-pot - the all in one multi honeypot platform