Alert correlation in intrusion detection: Combining AI-based approaches for exploiting security operators' knowledge and preferences

نویسندگان

  • Karim Tabia
  • Salem Benferhat
  • Philippe Leray
  • Ludovic Mé
چکیده

Alert correlation is a crucial problem for monitoring and securing computer networks. It consists in analyzing the alerts triggered by intrusion detection systems (IDSs) and other security related tools in order to detect complex attack plans, discover false alerts, etc. The huge amounts of alerts raised continuously by IDSs and the impossibility for security operators to efficiently analyze them requires tools for eliminating false and redundant alerts on the one hand and prioritize them according the detected activities’ dangerousness and preferences of the analysts on the other hand. In this paper, we describe an architecture that combines AI-based approaches for representing and reasoning with security operators’ knowledge and preferences. Moreover, this architecture allows to combines experts’ knowledge with machine learning and classifier based tools. This prototype collects the alerts raised by security related tools and analyzes them automatically. We first propose formalisms for representing both background and contextual knowledge on the monitored network, known attacks and vulnerabilities. We then propose another logic-based formalism for representing and reasoning with operators’ preferences regarding the events and alerts they want analyze in priority. We after that propose probabilistic models for detecting and predicting attack plans and severe attacks. Finally, we provide further discussions and future work directions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach

Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...

متن کامل

Alert correlation and prediction using data mining and HMM

Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...

متن کامل

M4D4: a Logical Framework to Support Alert Correlation in Intrusion Detection

Managing and supervising security in large networks has become a challenging task, as new threats and flaws are being discovered on a daily basis. This requires an in depth and up-to-date knowledge of the context in which security-related events occur. Several tools have been proposed to support security operators in this task, each of which focuses on some specific aspects of the monitoring. M...

متن کامل

Title : Alert Correlation in Collaborative Intelligent Intrusion

As complete prevention of computer attacks is not possible, intrusion detection systems (IDSs) play a very important role in minimizing the damage caused by different computer attacks. There are two intrusion detection methods: namely misuseand anomaly-based. A collaborative intelligent intrusion detection system (CIIDS) is proposed to include both methods, since it is concluded from recent res...

متن کامل

Reliable Alert Fusion of Multiple Intrusion Detection Systems

Alert Fusion is a process of combining alerts from multiple Intrusion Detection Systems to make a decision about the presence of attack or intrusion. A reliable decision from an alert fusion requires that Intrusion detectors involved in the fusion process generates fully reliable alerts. The unreliable alerts from intrusion detectors may completely misleads the decision making process. The exis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011