Context-Aware Intrusion Alerts Verification Approach

被引:0
|
作者
Saad, Sherif [1 ]
Traore, Issa [1 ]
Brocardo, Marcelo Luiz [1 ]
机构
[1] Univ Victoria, Elect & Comp Engn, Victoria, BC V8W 2Y2, Canada
关键词
Alert Verification; Intrusion Detection; Context-Aware; Semantic Similarity; False Positive; TAXONOMY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDSs) produce a massive number of intrusion alerts. A huge number of these alerts are false positives. Investigating false positive alerts is an expensive and time consuming process, and as such represents a significant problem for intrusion analysts. This shows the needs for automated approaches to eliminate false positive alerts. In this paper, we propose a novel alert verification and false positives reduction approach. The proposed approach uses context-aware and semantic similarity to filter IDS alerts and eliminate false positives. Evaluation of the approach with an IDS dataset that contains massive number of IDS alerts yields strong performance in detecting false positive alerts.
引用
收藏
页码:53 / 59
页数:7
相关论文
共 50 条
  • [21] CAM: CONTEXT-AWARE MASKING FOR ROBUST SPEAKER VERIFICATION
    Yu, Ya-Qi
    Zheng, Siqi
    Suo, Hongbin
    Lei, Yun
    Li, Wu-Jun
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 6703 - 6707
  • [22] A Logical Approach to Context-Aware Databases
    Martinenghi, Davide
    Torlone, Riccardo
    MANAGEMENT OF THE INTERCONNECTED WORLD, 2010, : 211 - 219
  • [23] An Integrated Approach for Context-Aware Development
    Macias, Aurora
    Navarro, Elena
    ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS, 2018,
  • [24] A Context-aware Authentication Approach for Smartphones
    Miraoui, Moeiz
    El-etriby, Sherif
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 503 - 507
  • [25] Context-Aware Services Engineering: Models, Transformations, and Verification
    Abeywickrama, Dhaminda B.
    Ramakrishnan, Sita
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2012, 11 (03)
  • [26] Context-aware Browsing - a practical approach
    Namiot, Dmitry
    2012 6TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST), 2012, : 18 - 23
  • [27] An infrastructure approach to context-aware computing
    Hong, JI
    Landay, JA
    HUMAN-COMPUTER INTERACTION, 2001, 16 (2-4): : 287 - 303
  • [28] Graph Representation Learning for Context-Aware Network Intrusion Detection
    Premkumar, Augustine
    Schneider, Madeleine
    Spivey, Carlton
    Pavlik, John A.
    Bastian, Nathaniel D.
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS V, 2023, 12538
  • [29] Road Context-Aware Intrusion Detection System for Autonomous Cars
    Jiang, Jingxuan
    Wang, Chundong
    Chattopadhyay, Sudipta
    Zhang, Wei
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 124 - 142
  • [30] Automated Context Formalization for Context-aware Specification Approach
    Benabbou, Amel
    Nait-Bahloul, Safia
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2018, 9 (03) : 23 - 47