Alarm clustering for intrusion detection systems in computer networks

被引:75
作者
Perdisci, Roberto [1 ]
Giacinto, Giorgio [1 ]
Roli, Fabio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
computer security; intrusion detection; alarm clustering;
D O I
10.1016/j.engappai.2006.01.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Until recently, network administrators manually arranged alarms produced by intrusion detection systems (IDS) to attain a high-level description of cyberattacks. As the number of alarms is increasingly growing, automatic tools for alarm clustering have been proposed to provide such a high-level description of the attack scenarios. In addition, it has been shown that effective threat analysis requires the fusion of different sources of information, such as different IDS. This paper proposes a new strategy to perform alarm clustering which produces unified descriptions of attacks from alarms produced by multiple IDS. In order to be effective, the proposed alarm clustering system takes into account two characteristics of IDS: (i) for a given attack, different sensors may produce a number of alarms reporting different attack descriptions. and (ii) a certain attack description may be produced by the IDS in response to different types of attack. Experimental results show that the high-level alarms produced by the alarm clustering module effectively summarize the attacks, drastically reducing the volume of alarms presented to the administrator. In addition, these high-level alarms can be used as the base to perform further higher-level threat analysis. (C) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:429 / 438
页数:10
相关论文
共 20 条
  • [1] Axelsson S, 2000, PRELIMINARY ATTEMPT
  • [2] Intrusion detection systems and multisensor data fusion
    Bass, T
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 99 - 105
  • [3] Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
  • [4] Managing alerts in a multi-intrusion detection environment
    Cuppens, F
    [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 22 - 31
  • [5] CURRY D, 2004, INTRUSION DETECTION
  • [6] Giacinto G, 2005, LECT NOTES ARTIF INT, V3587, P184
  • [7] Goldman RP, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, P329, DOI 10.1109/DISCEX.2001.932228
  • [8] HAINES J, 2003, IEEE SECUR PRIV, P46
  • [9] *ISS INC, REALSECURE INTR DET
  • [10] Data clustering: A review
    Jain, AK
    Murty, MN
    Flynn, PJ
    [J]. ACM COMPUTING SURVEYS, 1999, 31 (03) : 264 - 323