Towards Identifying True Threat from Network Security Data

نویسندگان

  • Zhitang Li
  • Jie Lei
  • Li Wang
  • Dong Li
  • Yang-ming Ma
چکیده

The growing deployment of network security mechanisms has brought great challenges to network security management. One most serious problem among them is that it is becoming increasingly difficult to identify the security incidents which pose true threat to the protected network system from tremendous volume of raw alerts. This paper presents our work on integrated management of network security data for true threat identification within the SATA (Security Alert and Threat Analysis) project. An algorithm for real-time threat analysis of security alerts named AlertRank is proposed in this paper and an alert aggregation algorithm is also employed. Experiments performed in a branch network of CERNET (China Education and Research Network) including an attack testing sub-network have shown that our approach can effectively identify true threats from various security alerts. ⊗ This work is patially supported by NSF Grant of China #60573120

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards adaptive event prioritization for network security - ideas and challenges

In the network security domain Intrusion detection systems (IDS) are known for their problems in creating huge amounts of data and especially false positives. Several approaches, originating in the machine learning domain, have been proposed for a better classification. However, threat prioritization has also shown, that a distinction in true and false positives is not always sufficient for a p...

متن کامل

Knowledge Translation in Healthcare – Towards Understanding its True Complexities; Comment on “Using Complexity and Network Concepts to Inform Healthcare Knowledge Translation”

This commentary argues that to fully appreciate the complexities of knowledge transfer one firstly has to distinguish between the notions of “data, information, knowledge and wisdom,” and that the latter two are highly context sensitive. In particular one has to understand knowledge as being personal rather than objective, and hence there is no form of knowledge that a-priori is more authoritat...

متن کامل

A novel kill-chain framework for remote security log analysis with SIEM software

Network security investigations pose many challenges to security analysts attempting to identify the root cause of security alarms or incidents. Analysts are often presented with cases where either incomplete information is present, or an overwhelming amount of information is presented in a disorganized manner. Either scenario greatly impacts the ability for incident responders to properly iden...

متن کامل

Security for Mobile Operators in Practice

Mobile operators are organizations that have to manage a great amount of critical information, including legal sensitive subscriber data. A number of assessment projects on the infrastructures of major mobile operators, revealed a number of vulnerabilities that if exploited may lead to important business impact. The scope of this paper is to publish these vulnerabilities towards the enhancement...

متن کامل

Infrastructural Map for Information Security

Abstract—The threat modeling process starts with the phases of identifying critical assets, creating an architecture overview, and decomposing to identify possible points of attack. Data flow diagrams and sequence diagrams are used in this process. This paper proposes an alternative flow-based methodology for building an architectural map for the system. It provides a high-level methodology for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007