A model-based survey of alert correlation techniques

被引:141
作者
Salah, Saeed [1 ]
Macia-Fernandez, Gabriel [1 ]
Diaz-Verdejo, Jesus E. [1 ]
机构
[1] Univ Granada, Dept Signal Theory Telemat & Commun, E-18071 Granada, Spain
关键词
Alert correlation; Network management systems; Fault localization; Intrusion detection systems; SCADA systems; INTRUSION DETECTION; FAULT LOCALIZATION;
D O I
10.1016/j.comnet.2012.10.022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
As telecommunication networks evolve rapidly in terms of scalability, complexity, and heterogeneity, the efficiency of fault localization procedures and the accuracy in the detection of anomalous behaviors are becoming important factors that largely influence the decision making process in large management companies. For this reason, telecommunication companies are doing a big effort investing in new technologies and projects aimed at finding efficient management solutions. One of the challenging issues for network and system management operators is that of dealing with the huge amount of alerts generated by the managed systems and networks. In order to discover anomalous behaviors and speed up fault localization processes, alert correlation is one of the most popular resources. Although many different alert correlation techniques have been investigated, it is still an active research field. In this paper, a survey of the state of the art in alert correlation techniques is presented. Unlike other authors, we consider that the correlation process is a common problem for different fields in the industry. Thus, we focus on showing the broad influence of this problem. Additionally, we suggest an alert correlation architecture capable of modeling current and prospective proposals. Finally, we also review some of the most important commercial products currently available. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:1289 / 1317
页数:29
相关论文
共 90 条
[1]
Abouabdalla O, 2009, PROCEEDINGS OF 2009 2ND IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, P463, DOI 10.1109/ICBNMT.2009.5348536
[2]
AGRAWAL R, 1995, PROC INT CONF DATA, P3, DOI 10.1109/ICDE.1995.380415
[3]
Alert Correlation Using Correlation Probability Estimation and Time Windows [J].
Ahmadinejad, Seyed Hossein ;
Jalili, Saeed .
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 2, 2009, :170-175
[4]
Al-Memory S., 2008, J COMPUTER VIROLOGY, V5, P271
[5]
MARS: Multi-stage Attack Recognition System [J].
Alserhani, Faeiz ;
Akhlaq, Monis ;
Awan, Irfan U. ;
Cullen, Andrea J. ;
Mirchandani, Pravin .
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, :753-759
[6]
Alert prioritization in intrusion detection systems [J].
Alsubhi, Khahd ;
Al-Shaer, Ehab ;
Boutaba, Raouf .
2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, :33-40
[7]
[Anonymous], 1993, INTEGRATED NETWORK M
[8]
[Anonymous], 2011, EL STAT TXB
[9]
[Anonymous], 2008 NEW TECHNOLOGIE
[10]
[Anonymous], 2001, INT WORKSH REC ADV I