On the use of weighted correlation in intrusion detection process

被引:0
作者
Autrel, F
Benferhat, S
Cuppens, F
机构
[1] CERT, ONERA, F-31055 Toulouse, France
[2] Univ Artois, CNRS, CRIL, F-62307 Lens, France
[3] ENST Bretagne, GET, F-35512 Cesson Sevigne, France
关键词
computer security; intruder detector; correlation; weighting; alarm; modeling;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Generally, an intruder must perform several actions, organized in an intrusion scenario, to achieve his or her malicious objectives. Actions are modeled by their pre and post conditions, which are a set of logical predicates or negations of predicates. Pre conditions of an action correspond to conditions the system's state must satisfy to perform the action. Post conditions correspond to the effects of executing the action on the system's state. When an intruder begins his intrusion, we can deduce, from the alerts generated by IDSS (Intrusion Detection Systems), several possible scenarios, by correlating attacks, that lead to multiple intrusion objectives. However with no further analysis, we are not able to decide which are the most plausible ones among the possible scenarios. We propose in this paper to define an order over the possible scenarios by weighting the correlation relations between successive attacks composing the scenarios. These weights reflect to what level executing some actions are necessary to execute some action B. We will see that to be satisfactory, the comparison operator between two scenarios must satisfy some properties.
引用
收藏
页码:1072 / 1091
页数:20
相关论文
共 50 条
  • [1] Utilisation de la corrélation pondérée dans un processus de détection d’intrusionsOn the use of weighted correlation in intrusion detection process
    Fabien Autrel
    Salem Benferhat
    Frédéric Cuppens
    Annales des Télécommunications, 2004, 59 (9-10): : 1072 - 1091
  • [2] Event Correlation for Intrusion Detection Systems
    Dwivedi, Neelam
    Tripathi, Aprna
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 133 - 139
  • [3] Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework
    Cuppens, F
    Autrel, F
    Bouzida, Y
    Garcia, J
    Gombault, S
    Sans, T
    ANNALS OF TELECOMMUNICATIONS, 2006, 61 (1-2) : 197 - 217
  • [4] Intrusion Detection Using Data Mining with Correlation
    Singh, Varsha
    Puthran, Shubha
    Tiwari, Avanish
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 620 - 625
  • [5] Intrusion Detection System with Correlation Engine and Vulnerability Assessment
    Waidyarathna, D. W. Y. O.
    Nayantha, W. V. A. C.
    Wijesinghe, W. M. T. C.
    Abeywardena, Kavinga Yapa
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (09) : 365 - 370
  • [6] New Approaches for Intrusion Detection Based on Logs Correlation
    Azarkasb, Sayed Omid
    Ghidary, Saeed Shiri
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 234 - 234
  • [7] Intrusion Detection based on Correlation of Multiple Health Signals in WBSN
    Mohamed, Mbarka Belhaj
    Meddeb-Makhlouf, Amel
    Fakhfakh, Ahmed
    Kanoun, Olfa
    PROCEEDINGS OF THE 2020 17TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD 2020), 2020, : 372 - 377
  • [8] A Hybrid Intrusion Detection System Based on Feature Selection and Weighted Stacking Classifier
    Zhao, Ruizhe
    Mu, Yingxue
    Zou, Long
    Wen, Xiumei
    IEEE ACCESS, 2022, 10 : 71414 - 71426
  • [9] A new intrusion detection and alarm correlation technology based on neural network
    Liu, Yansong
    Zhu, Li
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [10] A new intrusion detection and alarm correlation technology based on neural network
    Yansong Liu
    Li Zhu
    EURASIP Journal on Wireless Communications and Networking, 2019