Analyzing intensive intrusion alerts via correlation

被引:0
作者
Ning, P [1 ]
Cui, Y [1 ]
Reeves, DS [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
来源
RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS | 2002年 / 2516卷
关键词
intrusion detection; alert correlation; attack scenario analysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections. between them. In situations where there are intensive intrusions, not only will. actual alerts be mixed with false alerts, but the amount of alerts will also become unmanageable. As a result, it is difficult for human users or intrusion response systems to understand the alerts and take appropriate actions. Several complementary alert correlation methods have been proposed to address this problem. As one of these methods, we have developed a framework to correlate intrusion alerts using prerequisites of intrusions. In this paper, we continue this work to study the feasibility of this method in analyzing real-world, intensive intrusions. In particular, we develop three utilities (called adjustable graph reduction, focused analysis, and graph decomposition) to facilitate the analysis of large sets of correlated alerts. We study the effectiveness of the alert correlation method and these utilities through a case study with the network traffic captured at the DEF CON 8 Capture the Flag (CTF) event. Our results show that these utilities can simplify the analysis of large amounts of alerts, and also reveals several attack strategies that were repeatedly used in the DEF CON 8 CTF event.
引用
收藏
页码:74 / 94
页数:21
相关论文
共 50 条
[21]   A Bayesian network-based approach for learning attack strategies from intrusion alerts [J].
Kavousi, Fatemeh ;
Akbari, Behzad .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) :833-853
[22]   A comprehensive approach to intrusion detection alert correlation [J].
Valeur, F ;
Vigna, G ;
Kruegel, C ;
Kemmerer, RA .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (03) :146-169
[23]   Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems [J].
Lanvin, Maxime ;
Gimenez, Pierre-Francois ;
Han, Yufei ;
Majorczyk, Frederic ;
Me, Ludovic ;
Totel, Eric .
PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, :135-150
[24]   A Learning Framework for Transitioning Network Intrusion Alerts Management System to Ontology [J].
Fu, Chunlei ;
Duan, Qichang ;
Fu, Li ;
Xiang, Hong ;
Xiong, Zhongyang ;
Hu, Haibo .
JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2011, 43 (03) :247-265
[25]   Alert Correlation for Cyber-Manufacturing Intrusion Detection [J].
Wu, Mingtao ;
Moon, Young .
47TH SME NORTH AMERICAN MANUFACTURING RESEARCH CONFERENCE (NAMRC 47), 2019, 34 :820-831
[26]   Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection [J].
Vermeer, Mathew ;
van Eeten, Michel ;
Ganan, Carlos .
ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, :799-813
[27]   Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts [J].
Georgios Spathoulas ;
Georgios Theodoridis ;
Georgios-Paraskevas Damiris .
International Journal of Information Security, 2021, 20 :347-370
[28]   Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts [J].
Spathoulas, Georgios ;
Theodoridis, Georgios ;
Damiris, Georgios-Paraskevas .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (03) :347-370
[29]   Real-Time Attack Scenario Detection via Intrusion Detection Alert Correlation [J].
Zali, Zeinab ;
Hashemi, Massoud Reza ;
Saidi, Hossein .
2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, :95-102
[30]   Survey of intrusion-detection alert aggregation and correlation techniques [J].
School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China .
Jisuanji Yanjiu yu Fazhan, 2006, 1 (1-8) :1-8