Preprocessor of Intrusion Alerts Correlation Based on Ontology

被引:4
作者
Li, Wan [1 ]
Tian, Shengfeng [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
来源
2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3 | 2009年
关键词
D O I
10.1109/CMC.2009.63
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDS) often provide a large number and poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder's next likely goal. Several alert correlation techniques have been proposed to facilitate the analysis of intrusion alerts. However, many works directly upon the alerts, they do not distinguish between alerts and intruders' attack actions. In addition, many works are not grounded on any standard taxonomy, their associated classification schemes are ad hoc and localized. This paper focus on reducing alerts to attack actions with IDMEF and CVE standards in the preprocessor of our intrusion alerts correlation system which is based on ontology. At first, we introduce our intrusion alerts correlation system. Then we present each modules of the preprocessor, the, v are local preprocessor, IDMEF parser, alert to attack module and attack to ontology module.
引用
收藏
页码:460 / +
页数:2
相关论文
共 17 条
  • [1] [Anonymous], 2002, Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, DOI DOI 10.1145/586110.586144
  • [2] [Anonymous], 2000 DARPA INTRUSION
  • [3] Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
  • [4] Cuppens F., 2002, SECI 02 P 2002 INT C, P153
  • [5] DEBAR H, 2001, RFC4765
  • [6] A TRANSLATION APPROACH TO PORTABLE ONTOLOGY SPECIFICATIONS
    GRUBER, TR
    [J]. KNOWLEDGE ACQUISITION, 1993, 5 (02): : 199 - 220
  • [7] Julisch Klaus., 2002, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, P366, DOI [10.1145/775047.775101, DOI 10.1145/775047.775101]
  • [8] MITRE Corporation, COMM VULN EXP
  • [9] Ning P., 2004, ACM Transactions on Information and Systems Security, V7, P591, DOI 10.1145/1042031.1042036
  • [10] NING P, 2001, TR200113 N CAR STAT