Intrusion detection alarms reduction using root cause analysis and clustering

被引:49
作者
Al-Mamory, Safaa O. [1 ]
Zhang, Hongli [1 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
关键词
Network security; Intrusion detection system; False positive; Root causes; Alarms clustering; VALIDATION;
D O I
10.1016/j.comcom.2008.11.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As soon as the Intrusion Detection System (IDS) detects any suspicious activity, it will generate several alarms referring to as security breaches. Unfortunately, the triggered alarms usually are accompanied with huge number of false positives. In this paper, we use root cause analysis to discover the root causes making the IDS triggers these false alarms: most of these root causes are not attacks. Removing the root causes enhances alarms quality in the future. The root cause instigates the IDS to trigger alarms that almost always have similar features. These similar alarms can be clustered together; consequently, we have designed a new clustering technique to group IDS alarms and to produce clusters. Then, each cluster is modeled by a generalized alarm. The generalized alarms related to root causes are converted (by the security analyst) to filters in order to reduce future alarms' load. The suggested system is a semi-automated system helping the security analyst in specifying the root causes behind these false alarms and in writing accurate filtering rules. The proposed clustering method was verified with three different datasets, and the averaged reduction ratio was about 74% of the total alarms. Application of the new technique to alarms log greatly helps the security analyst in identifying the root causes; and then reduces the alarm load in the future. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:419 / 430
页数:12
相关论文
共 40 条
[11]  
Han J., 1994, P AAAI 94 WORKSHOP K, P157
[12]   DATA-DRIVEN DISCOVERY OF QUANTITATIVE RULES IN RELATIONAL DATABASES [J].
HAN, JW ;
CAI, YD ;
CERCONE, N .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1993, 5 (01) :29-40
[13]  
HAN JW, 1992, PROC INT CONF VERY L, P547
[14]  
Han JW, 2000, DATA MINING CONCEPTS
[15]  
HAND D, 1993, J COMPUTER COMMUNICA, V23, P26
[16]  
HEINONEN O, 1996, ATTRIBUTE ORIENTED I
[17]   Data clustering: A review [J].
Jain, AK ;
Murty, MN ;
Flynn, PJ .
ACM COMPUTING SURVEYS, 1999, 31 (03) :264-323
[18]  
Julisch K., 2003, ACM Transactions on Information and Systems Security, V6, P443, DOI 10.1145/950191.950192
[19]   Mining alarm clusters to improve alarm handling efficiency [J].
Julisch, K .
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, :12-21
[20]  
Livingston A., 2001, Root causes analysis: Literature review, P1