Using Outlier Detection to Reduce False Positives in Intrusion Detection

被引:0
作者
Xiao, Fu [1 ]
Li, Xie [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210093, Peoples R China
来源
2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS | 2008年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection Systems (IDSs) can easily; create thousands of alerts per day, up to 99% of which are false positives (i.e. alerts that are triggered incorrectly, by benign events), This makes it extremely difficult for managers to analyze and react to attacks. This paper presents a novel method for handling IDS more efficiently. It introduces outlier detection technique into this field, and designs a special outlier detection algorithm for identifying true alerts and reducing false positives. This algorithm uses frequent attribute values minded from historical alerts as the features of false positives, and then filters false alerts the score calculated based on these features. We also proposed a two-phrase framework, which not only can filter newcome alerts in real time, but also can learn from these alerts and automatically adjust the filtering mechanism to new situations. Moreover our method needs no domain knowledge and little human assistance, so it is more practical than current ways. We have built a prototype implementation of our method. And the experiments on DARPA 2000 and real-world data have proved that this model has high performance.
引用
收藏
页码:26 / +
页数:2
相关论文
共 15 条
[1]  
Alharby A, 2005, LECT NOTES COMPUT SC, V3531, P192
[2]  
[Anonymous], 2002, P 8 ACM SIGKDD INT C, DOI DOI 10.1145/775047.775101
[3]  
[Anonymous], P NSF WORKSH NEXT GE
[4]  
Clifton C, 2000, IEEE MILIT COMMUN C, P440, DOI 10.1109/MILCOM.2000.904991
[5]  
Ertoz L., 2003, P 2 SIAM INT C DAT M, P1
[6]  
He Zengyou, 2005, Computer Science and Information Systems, V2, P103, DOI DOI 10.2298/CSIS0501103H
[7]  
Julisch K., 2003, ACM Transactions on Information and Systems Security, V6, P443, DOI 10.1145/950191.950192
[8]   Mining alarm clusters to improve alarm handling efficiency [J].
Julisch, K .
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, :12-21
[9]  
LEUSKI A, 2000, P ACM CIKM 01, P33
[10]   A data mining analysis of RTID alarms [J].
Manganaris, S ;
Christensen, M ;
Zerkle, D ;
Hermiz, K .
COMPUTER NETWORKS, 2000, 34 (04) :571-577