On the use of weighted correlation in intrusion detection process

被引:0
作者
Autrel, F
Benferhat, S
Cuppens, F
机构
[1] CERT, ONERA, F-31055 Toulouse, France
[2] Univ Artois, CNRS, CRIL, F-62307 Lens, France
[3] ENST Bretagne, GET, F-35512 Cesson Sevigne, France
关键词
computer security; intruder detector; correlation; weighting; alarm; modeling;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Generally, an intruder must perform several actions, organized in an intrusion scenario, to achieve his or her malicious objectives. Actions are modeled by their pre and post conditions, which are a set of logical predicates or negations of predicates. Pre conditions of an action correspond to conditions the system's state must satisfy to perform the action. Post conditions correspond to the effects of executing the action on the system's state. When an intruder begins his intrusion, we can deduce, from the alerts generated by IDSS (Intrusion Detection Systems), several possible scenarios, by correlating attacks, that lead to multiple intrusion objectives. However with no further analysis, we are not able to decide which are the most plausible ones among the possible scenarios. We propose in this paper to define an order over the possible scenarios by weighting the correlation relations between successive attacks composing the scenarios. These weights reflect to what level executing some actions are necessary to execute some action B. We will see that to be satisfactory, the comparison operator between two scenarios must satisfy some properties.
引用
收藏
页码:1072 / 1091
页数:20
相关论文
共 50 条
  • [21] Filtering intrusion detection alarms
    Mansour, Nashat
    Chehab, Maya I.
    Faour, Ahmad
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2010, 13 (01): : 19 - 29
  • [22] Filtering intrusion detection alarms
    Nashat Mansour
    Maya I. Chehab
    Ahmad Faour
    Cluster Computing, 2010, 13 : 19 - 29
  • [23] An immune paradigm for intrusion detection
    Liu, Xiaojie
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, PROCEEDINGS, 2007, : 365 - 369
  • [24] S-MAIDS: A Semantic Model for Automated Tuning, Correlation, and Response Selection in Intrusion Detection Systems
    Strasburg, Chris
    Basu, Samik
    Wong, Johnny S.
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 319 - 328
  • [25] A weighted rank measure of correlation
    Da Costa, JP
    Soares, C
    AUSTRALIAN & NEW ZEALAND JOURNAL OF STATISTICS, 2005, 47 (04) : 515 - 529
  • [26] Intrusion-detection for incident-response, using a military battlefield-intelligence process
    Yuill, J
    Wu, F
    Settle, J
    Gong, F
    Forno, R
    Huang, M
    Asbery, J
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (04): : 671 - 697
  • [27] Multimodal Continual Learning for Process Monitoring: A Novel Weighted Canonical Correlation Analysis With Attention Mechanism
    Zhang, Jingxin
    Xiao, James
    Chen, Maoyin
    Hong, Xia
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2025, 36 (01) : 1827 - 1841
  • [28] Normalized Weighted and Reverse Weighted Correlation Based Apriori Algorithm
    Ehsan, Amimul
    Patil, Nagamma
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 841 - 847
  • [29] A Novel Method of Vein Detection with the Use of Digital Image Correlation
    Lutowski, Zbigniew
    Bujnowski, Slawomir
    Marciniak, Beata
    Kloska, Sylwester
    Marciniak, Anna
    Lech, Piotr
    ENTROPY, 2021, 23 (04)
  • [30] A methodology for testing intrusion detection systems
    Puketza, NJ
    Zhang, K
    Chung, M
    Mukherjee, B
    Olsson, RA
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (10) : 719 - 729