An alert correlation platform for memory-supported techniques

被引:2
作者
Roschke, Sebastian [1 ]
Cheng, Feng [1 ]
Meinel, Christoph [1 ]
机构
[1] Univ Potsdam, Hasso Plattner Inst, D-14440 Potsdam, Germany
关键词
memory-based correlation; memory-based clustering; memory-based databases; IDS management;
D O I
10.1002/cpe.1750
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Intrusion Detection Systems (IDS) have been widely deployed in practice for detecting malicious behavior on network communication and hosts. False-positive alerts are a popular problem for most IDS approaches. The solution to address this problem is to enhance the detection process by correlation and clustering of alerts. To meet the practical requirements, this process needs to be finished fast, which is a challenging task as the amount of alerts in large-scale IDS deployments is significantly high. We identifytextitdata storage and processing algorithms to be the most important factors influencing the performance of clustering and correlation. We propose and implement a highly efficient alert correlation platform. For storage, a column-based database, an In-Memory alert storage, and memory-based index tables lead to significant improvements of the performance. For processing, algorithms are designed and implemented which are optimized for In-Memory databases, e.g. an attack graph-based correlation algorithm. The platform can be distributed over multiple processing units to share memory and processing power. A standardized interface is designed to provide a unified view of result reports for end users. The efficiency of the platform is tested by practical experiments with several alert storage approaches, multiple algorithms, as well as a local and a distributed deployment. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:1123 / 1136
页数:14
相关论文
共 31 条
[1]  
Abadi D.J., 2006, P ACM SIGMOD INT C M, P671, DOI [DOI 10.1145/1142473.1142548, 10.1145/1142473.1142548]
[2]  
Abadi D.J., 2008, P 2008 ACM SIGMOD IN, P967, DOI DOI 10.1145/1376616.1376712
[3]  
[Anonymous], 2002, Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, DOI DOI 10.1145/586110.586144
[4]  
[Anonymous], 2005, P 14 C USENIX SECURI
[5]  
[Anonymous], 2004, NDSS
[6]  
[Anonymous], 2001, Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, RAID'00, DOI 10.1007/3-540-45474-86
[7]  
[Anonymous], 2009, CAUSALITY MODELS REA
[8]  
Boncz P, 1999, PROCEEDINGS OF THE TWENTY-FIFTH INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, P54
[9]  
Boncz Peter, 2002, Thesis
[10]   Managing alerts in a multi-intrusion detection environment [J].
Cuppens, F .
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, :22-31