Analyzing intensive intrusion alerts via correlation

被引:0
作者
Ning, P [1 ]
Cui, Y [1 ]
Reeves, DS [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
来源
RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS | 2002年 / 2516卷
关键词
intrusion detection; alert correlation; attack scenario analysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections. between them. In situations where there are intensive intrusions, not only will. actual alerts be mixed with false alerts, but the amount of alerts will also become unmanageable. As a result, it is difficult for human users or intrusion response systems to understand the alerts and take appropriate actions. Several complementary alert correlation methods have been proposed to address this problem. As one of these methods, we have developed a framework to correlate intrusion alerts using prerequisites of intrusions. In this paper, we continue this work to study the feasibility of this method in analyzing real-world, intensive intrusions. In particular, we develop three utilities (called adjustable graph reduction, focused analysis, and graph decomposition) to facilitate the analysis of large sets of correlated alerts. We study the effectiveness of the alert correlation method and these utilities through a case study with the network traffic captured at the DEF CON 8 Capture the Flag (CTF) event. Our results show that these utilities can simplify the analysis of large amounts of alerts, and also reveals several attack strategies that were repeatedly used in the DEF CON 8 CTF event.
引用
收藏
页码:74 / 94
页数:21
相关论文
共 50 条
[41]   Adaptive IDS Alerts Correlation according to the traffic type and the attacks properties [J].
Sourour, Meharouech ;
Adel, Bouhoula ;
Tarek, Abbes .
2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, :1652-1657
[42]   Discovering Coordinated Groups of IP Addresses Through Temporal Correlation of Alerts [J].
Zadnik, Martin ;
Wrona, Jan ;
Hynek, Karel ;
Cejka, Tomas ;
Husak, Martin .
IEEE ACCESS, 2022, 10 :82799-82813
[43]   Real-time Intrusion Alert Correlation System based on Prerequisites and Consequence [J].
Lin Zhaowen ;
Li Shan ;
Ma Yan .
2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
[44]   An Innovative Framework for Collaborative Intrusion Alert Correlation [J].
Elshoush, Huwaida Tagelsir Ibrahim .
2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, :607-614
[45]   Correlation of Intrusion Detection Information in Grid Environments [J].
Leordeanu, Catalin ;
Arif, Levni ;
Cristea, Valentin .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, :463-468
[46]   Alert correlation in a cooperative intrusion detection framework [J].
Cuppens, F ;
Miège, A .
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, :202-215
[47]   Cybersecurity in the AI era: analyzing the impact of machine learning on intrusion detection [J].
Dong, Huiyao ;
Kotenko, Igor .
KNOWLEDGE AND INFORMATION SYSTEMS, 2025, 67 (05) :3915-3966
[48]   Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation [J].
Cheng, Xiang ;
Zhang, Jiale ;
Chen, Bing .
SENSORS, 2019, 19 (18)
[49]   Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation [J].
Castillo Fernandez, Elvira ;
Diaz-Verdejo, Jesus E. ;
Estepa Alonso, Rafael ;
Estepa Alonso, Antonio ;
Munoz-Calle, Javier ;
Madinabeitia, German .
PROCEEDINGS OF THE 2023 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2023, 2023, :1-6
[50]   Improving Effectiveness of Intrusion Detection by Correlation Feature Selection [J].
Nguyen, Hai ;
Franke, Katrin ;
Petrovic, Slobodan .
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, :17-24