FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems

被引:20
作者
Alsubhi, Khalid [1 ]
Aib, Issam
Boutaba, Raouf [1 ,2 ]
机构
[1] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
[2] POSTECH, Div IT Convergence Engn, Pohang 790784, KB, South Korea
基金
加拿大自然科学与工程研究理事会;
关键词
Intrusion Detection Systems (IDSes); Alert Prioritization; Alert Management;
D O I
10.1002/nem.804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDSs) are designed to monitor a networked environment and generate alerts whenever abnormal activities are detected. The number of these alerts can be very large, making their evaluation by security analysts a difficult task. Management is complicated by the need to configure the different components of alert evaluation systems. In addition, IDS alert management techniques, such as clustering and correlation, suffer from involving unrelated alerts in their processes and consequently provide results that are inaccurate and difficult to manage. Thus the tuning of an IDS alert management system in order to provide optimal results remains a major challenge, which is further complicated by the large spectrum of potential attacks the system can be subject to. This paper considers the specification and configuration issues of FuzMet, a novel IDS alert management system which employs several metrics and a fuzzy-logic based approach for scoring and prioritizing alerts. In addition, it features an alert rescoring technique that leads to a further reduction in the number of alerts. Comparative results between SNORT scores and FuzMet alert prioritization onto a real attack dataset are presented, along with a simulation-based investigation of the optimal configuration of FuzMet. The results prove the enhanced intrusion detection accuracy brought by our system. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:263 / 284
页数:22
相关论文
共 25 条
[1]  
Abedin Muhammad., 2006, QOP 06
[2]   Alert prioritization in intrusion detection systems [J].
Alsubhi, Khahd ;
Al-Shaer, Ehab ;
Boutaba, Raouf .
2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, :33-40
[3]  
[Anonymous], 2002, Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, DOI DOI 10.1145/586110.586144
[4]  
[Anonymous], NAT VULN DAT
[5]  
[Anonymous], FALSE POSITIVES USER
[6]  
[Anonymous], 2000, 2000 DARP INTR DET S
[7]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[8]  
Cuppens F, 2000, RECENT ADV INTRUSION
[9]  
Curry D, 2007, 4765 RFC
[10]  
Debar H, 2001, R D AGGREGATION CORR