Intrusion detection alarms reduction using root cause analysis and clustering

被引:49
作者
Al-Mamory, Safaa O. [1 ]
Zhang, Hongli [1 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
关键词
Network security; Intrusion detection system; False positive; Root causes; Alarms clustering; VALIDATION;
D O I
10.1016/j.comcom.2008.11.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As soon as the Intrusion Detection System (IDS) detects any suspicious activity, it will generate several alarms referring to as security breaches. Unfortunately, the triggered alarms usually are accompanied with huge number of false positives. In this paper, we use root cause analysis to discover the root causes making the IDS triggers these false alarms: most of these root causes are not attacks. Removing the root causes enhances alarms quality in the future. The root cause instigates the IDS to trigger alarms that almost always have similar features. These similar alarms can be clustered together; consequently, we have designed a new clustering technique to group IDS alarms and to produce clusters. Then, each cluster is modeled by a generalized alarm. The generalized alarms related to root causes are converted (by the security analyst) to filters in order to reduce future alarms' load. The suggested system is a semi-automated system helping the security analyst in specifying the root causes behind these false alarms and in writing accurate filtering rules. The proposed clustering method was verified with three different datasets, and the averaged reduction ratio was about 74% of the total alarms. Application of the new technique to alarms log greatly helps the security analyst in identifying the root causes; and then reduces the alarm load in the future. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:419 / 430
页数:12
相关论文
共 40 条
[1]  
Al-Mamory SO, 2007, ELE COM ENG, P69
[2]  
[Anonymous], 2003, THESIS U DORTMUND
[3]  
Berry MichaelJ., 1996, Data mining techniques for marketing, sales, and customer support
[4]   Some new indexes of cluster validity [J].
Bezdek, JC ;
Pal, NR .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 1998, 28 (03) :301-315
[5]  
DAIN O, 2001, P 2001 IEEE WORKSH I, P231
[6]   CLUSTER SEPARATION MEASURE [J].
DAVIES, DL ;
BOULDIN, DW .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1979, 1 (02) :224-227
[7]  
Dougherty, 1995, P 12 INT C MACH LEAR, V1995, P194, DOI DOI 10.1016/B978-1-55860-377-6.50032-3
[8]  
Halkidi M, 2000, LECT NOTES COMPUT<D>, V1910, P265
[9]   On clustering validation techniques [J].
Halkidi, M ;
Batistakis, Y ;
Vazirgiannis, M .
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2001, 17 (2-3) :107-145
[10]  
Han J., 1996, Advances in knowledge discovery and data mining, P399