On the use of weighted correlation in intrusion detection process

被引:0
作者
Autrel, F
Benferhat, S
Cuppens, F
机构
[1] CERT, ONERA, F-31055 Toulouse, France
[2] Univ Artois, CNRS, CRIL, F-62307 Lens, France
[3] ENST Bretagne, GET, F-35512 Cesson Sevigne, France
关键词
computer security; intruder detector; correlation; weighting; alarm; modeling;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Generally, an intruder must perform several actions, organized in an intrusion scenario, to achieve his or her malicious objectives. Actions are modeled by their pre and post conditions, which are a set of logical predicates or negations of predicates. Pre conditions of an action correspond to conditions the system's state must satisfy to perform the action. Post conditions correspond to the effects of executing the action on the system's state. When an intruder begins his intrusion, we can deduce, from the alerts generated by IDSS (Intrusion Detection Systems), several possible scenarios, by correlating attacks, that lead to multiple intrusion objectives. However with no further analysis, we are not able to decide which are the most plausible ones among the possible scenarios. We propose in this paper to define an order over the possible scenarios by weighting the correlation relations between successive attacks composing the scenarios. These weights reflect to what level executing some actions are necessary to execute some action B. We will see that to be satisfactory, the comparison operator between two scenarios must satisfy some properties.
引用
收藏
页码:1072 / 1091
页数:20
相关论文
共 50 条
  • [41] Weighted Correlation Embedding Learning for Domain Adaptation
    Lu, Yuwu
    Zhu, Qi
    Zhang, Bob
    Lai, Zhihui
    Li, Xuelong
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 31 : 5303 - 5316
  • [42] Combined data mining approach for intrusion detection
    Zurutuza, U.
    Uribeetxeberria, R.
    Azketa, E.
    Gil, G.
    Lizarraga, J.
    Fernandez, M.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 67 - 73
  • [43] Fuzzy feature extraction and visualization for intrusion detection
    Xin, JQ
    Dickerson, JE
    Dickerson, JA
    PROCEEDINGS OF THE 12TH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1 AND 2, 2003, : 1249 - 1254
  • [44] Intrusion detection using an ensemble of intelligent paradigms
    Mukkamala, S
    Sung, AH
    Abraham, A
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2005, 28 (02) : 167 - 182
  • [45] An Integrated Approach to Network Intrusion Detection and Prevention
    Prakash, B. Bhanu
    Yeswanth, Kaki
    Srinivas, M. Sai
    Balaji, S.
    Sekhar, Y. Chandra
    Nair, Aswathy K.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 43 - 51
  • [46] USING NEURAL NETWORKS IN INTRUSION DETECTION SYSTEMS
    Merhaut, Filip
    Zelinka, Ivan
    MENDEL 2008, 2008, : 172 - 174
  • [47] Neural Networks for Intrusion Detection and Its Applications
    Reddy, E. Kesavulu
    WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1210 - 1214
  • [48] USING MACHINE LEARNING FOR INTRUSION DETECTION SYSTEMS
    Quang-Vinh Dang
    COMPUTING AND INFORMATICS, 2022, 41 (01) : 12 - 33
  • [49] Intelligent Agents for Distributed Intrusion Detection System
    Benattou, M.
    Tamine, K.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 190 - 193
  • [50] A revised taxonomy for intrusion-detection systems
    Debar, H
    Dacier, M
    Wespi, A
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2000, 55 (7-8): : 361 - 378