Correlating intrusion alerts to obtain attack instances through improved evolving self-organizing maps

被引:0
作者
Xiao, Y. [1 ]
Wang, X. H. [1 ]
机构
[1] NW Univ Xian, Sch Informat Sci & Technol, Xian 710127, Peoples R China
来源
2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1 | 2008年
关键词
intrusion alert; attack instance; correlation; improved evolving self-organizing map;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An attack instance database is fundamental to the whole network security key knowledge system that is significant and useful to solve some problems occurred in network security. But traditional intrusion detection systems (IDSs) focus on low-level attacks and anomalies, and raise alerts independently. So it is difficult to obtain interesting attack instances from these alerts directly. In this paper, an approach of correlating intrusion alerts to obtain attack instances through the improved evolving self-organizing map (IESOM) was proposed. IESOM is an evolving extension of the self-organizing map (SOM) model, which allows for an evolvable network structure and very fast incremental learning. The system of correlating intrusion alerts to obtain attack instances through IESOM has seven components: normalization, restraining, pre-processing, fusion,, clustering, combination and filtering, and the attack instances are given as the output of the system at last. The results obtained with LLS DDOS1.0 and real-word dataset B prove that the approach is useful and effective.
引用
收藏
页码:580 / 586
页数:7
相关论文
共 13 条
[1]  
[Anonymous], 2001, Proceeding of the 2001 ACM Workshop on Data Mining for Security Applications
[2]  
Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
[3]  
Debar H., 2001, P 4 INT S REC ADV IN, P85, DOI DOI 10.1007/3-540-45474-8_
[4]   On-line pattern analysis by evolving self-organizing maps [J].
Deng, D ;
Kasabov, N .
NEUROCOMPUTING, 2003, 51 :87-103
[5]  
*INT SEC SYST, 2004, REALSECURE INTR DET
[6]   SELF-ORGANIZED FORMATION OF TOPOLOGICALLY CORRECT FEATURE MAPS [J].
KOHONEN, T .
BIOLOGICAL CYBERNETICS, 1982, 43 (01) :59-69
[7]   MEASURE OF LACK OF FIT IN TIME-SERIES MODELS [J].
LJUNG, GM ;
BOX, GEP .
BIOMETRIKA, 1978, 65 (02) :297-303
[8]  
*LLS, 2000, DDOS10 LLS
[9]  
NING P, 2002, P 5 INT S REC ADV IN, P74
[10]  
Roesch M, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE THIRTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIII), P229