On the use of weighted correlation in intrusion detection process

被引:0
作者
Autrel, F
Benferhat, S
Cuppens, F
机构
[1] CERT, ONERA, F-31055 Toulouse, France
[2] Univ Artois, CNRS, CRIL, F-62307 Lens, France
[3] ENST Bretagne, GET, F-35512 Cesson Sevigne, France
关键词
computer security; intruder detector; correlation; weighting; alarm; modeling;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Generally, an intruder must perform several actions, organized in an intrusion scenario, to achieve his or her malicious objectives. Actions are modeled by their pre and post conditions, which are a set of logical predicates or negations of predicates. Pre conditions of an action correspond to conditions the system's state must satisfy to perform the action. Post conditions correspond to the effects of executing the action on the system's state. When an intruder begins his intrusion, we can deduce, from the alerts generated by IDSS (Intrusion Detection Systems), several possible scenarios, by correlating attacks, that lead to multiple intrusion objectives. However with no further analysis, we are not able to decide which are the most plausible ones among the possible scenarios. We propose in this paper to define an order over the possible scenarios by weighting the correlation relations between successive attacks composing the scenarios. These weights reflect to what level executing some actions are necessary to execute some action B. We will see that to be satisfactory, the comparison operator between two scenarios must satisfy some properties.
引用
收藏
页码:1072 / 1091
页数:20
相关论文
共 50 条
  • [31] A conceptual space model for intrusion detection
    d'Auriol, BJ
    Akinsanmi, A
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 133 - 139
  • [32] Honeyfiles: Deceptive files for intrusion detection
    Yuill, J
    Zappe, M
    Denning, D
    Feer, F
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 116 - 122
  • [33] A Brief Introduction to Intrusion Detection System
    Mohamed, Ashara Banu
    Idris, Norbik Bashah
    Shanmugum, Bharanidharan
    TRENDS IN INTELLIGENT ROBOTICS, AUTOMATION, AND MANUFACTURING, 2012, 330 : 263 - 271
  • [34] Intrusion Detection Based on Data Mining
    Oreku, George S.
    Mtenzi, Fredrick J.
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 696 - 701
  • [35] Securing Collaborative Intrusion Detection Systems
    Cheung, Steven
    IEEE SECURITY & PRIVACY, 2011, 9 (06) : 36 - 42
  • [36] Intrusion detection and the role of the system administrator
    Sommestad, Teodor
    Hunstad, Amund
    Information Management and Computer Security, 2013, 21 (01): : 30 - 40
  • [37] HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis
    Lei, Shengwei
    Xia, Chunhe
    Li, Zhong
    Li, Xiaojian
    Wang, Tianbo
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (04): : 3257 - 3274
  • [38] Harmful Intrusion Detection Algorithm of Optical Fiber Pre-Warning System Based on Correlation of Orthogonal Polarization Signals
    Bi, Fukun
    Feng, Chong
    Qu, Hongquan
    Zheng, Tong
    Wang, Chonglei
    PHOTONIC SENSORS, 2017, 7 (03) : 226 - 233
  • [39] Harmful intrusion detection algorithm of optical fiber pre-warning system based on correlation of orthogonal polarization signals
    Fukun Bi
    Chong Feng
    Hongquan Qu
    Tong Zheng
    Chonglei Wang
    Photonic Sensors, 2017, 7 : 226 - 233
  • [40] Assessing degree of intrusion scope (DIS): a statistical strategy for anomaly based intrusion detection
    V. Jyothsna
    V. V. Rama Prasad
    CSI Transactions on ICT, 2018, 6 (2) : 99 - 127