Modeling network intrusion detection alerts for correlation

被引:58
作者
Zhou, Jingmin [1 ]
Heckman, Mark [2 ]
Reynolds, Brennen [2 ]
Carlson, Adam [1 ]
Bishop, Matt [1 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[2] Promia Inc, Davis, CA 95616 USA
关键词
alert correlation; alert fusion; capability; intrusion detection;
D O I
10.1145/1210263.1210267
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signature- based network intrusion- detection systems ( NIDSs) often report a massive number of simple alerts of low- level security- related events. Many of these alerts are logically involved in a single multi- stage intrusion incident and a security officer often wants to analyze the complete incident instead of each individual simple alert. This paper proposes a well- structured model that abstracts the logical relation between the alerts in order to support automatic correlation of those alerts involved in the same intrusion. The basic building block of the model is a logical formula called a capability. We use capability to abstract consistently and precisely all levels of accesses obtained by the attacker in each step of a multistage intrusion. We then derive inference rules to define logical relations between different capabilities. Based on the model and the inference rules, we have developed several novel alert correlation algorithms and implemented a prototype alert correlator. The experimental results of the correlator using several intrusion datasets demonstrate that the approach is effective in both alert fusion and alert correlation and has the ability to correlate alerts of complex multistage intrusions. In several instances, the alert correlator successfully correlated more than two thousand Snort alerts involved in massive scanning incidents. It also helped us find two multistage intrusions that were missed in auditing by the security officers.
引用
收藏
页数:31
相关论文
共 31 条
[1]  
ALLEN J, 1999, CMUSEI99TR028
[2]  
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[3]   Intrusion detection systems and multisensor data fusion [J].
Bass, T .
COMMUNICATIONS OF THE ACM, 2000, 43 (04) :99-105
[4]  
Bass T., 1999, P IRIS NAT S SENS DA
[5]  
CHEUNG S, 2003, P DARPA INF SURV C E
[6]  
Cormen T. H., 2001, Introduction to Algorithms, V2nd
[7]  
CUI Y, 2002, THESIS N CAROLINA ST
[8]  
Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
[9]  
CUPPENS F, 2002, P SECI02 WORKSH
[10]  
DEBAR H, 2001, P INT S REC ADV INTR