A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs

被引:46
作者
Ahmadinejad, Seyed Hossein [1 ]
Jalili, Saeed [1 ,3 ]
Abadi, Mandi [1 ,2 ]
机构
[1] Tarbiat Modares Univ, Intrus Prevent Detect Lab, Fac Elect & Comp Engn, Tehran, Iran
[2] Tarbiat Modares Univ, Dept Comp Engn, Tehran, Iran
[3] Tarbiat Modares Univ, Sch Elect & Comp Engn, Tehran, Iran
关键词
Alert correlation; Network security; Attack graph; Exploit; Intrusion detection;
D O I
10.1016/j.comnet.2011.03.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Managing and analyzing a huge number of low-level alerts is very difficult and exhausting for network administrators. Alert correlation methods have been proposed to decrease the number of alerts and make them more intelligible. Proposed methods for alert correlation are different in terms of their performance, accuracy and adaptivity. We present a new hybrid model not only to correlate alerts as accurately and efficiently as possible but also to be able to boost the model in the course of time. The model presented in this paper consists of two parts: (1) an attack graph-based method to correlate alerts raised for known attacks and hypothesize missed alerts and (2) a similarity-based method to correlate alerts raised for unknown attacks which can not be correlated using the first part and also to update the attack graph. These two parts cooperate with each other such that if the first part could not correlate a new alert, the second part is applied. We propose two different methods for these two parts. In order to update the attack graph, we present a technique (using the similarity-based method in the second part of the model) which is actually the most salient feature of our model: capability of hypothesizing missed exploits and discovering defects in pre and post conditions of known exploits in attack graphs. We also propose an additional method named alerts bisimulation for compressing graphs of correlated alerts. The results of experiments on DARPA2000 clearly show the model can accurately correlate alerts. Also the ability of updating attack graphs is illustrated using an experiment. (C) 2011 Elsevier B.V All rights reserved.
引用
收藏
页码:2221 / 2240
页数:20
相关论文
共 38 条
[1]  
AHMADINEJAD SH, 2009, IEEE COMP SOC C PUBL, V2, P170
[2]  
[Anonymous], 2002, Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, DOI DOI 10.1145/586110.586144
[3]  
[Anonymous], 2004, NDSS
[4]   Alarm reduction and correlation in defence of IP networks [J].
Chyssler, T ;
Nadjm-Tehrani, S ;
Burschka, S ;
Burbeck, K .
THIRTEENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2004, :229-234
[5]  
Cormen T., 2001, Introduction to Algorithms
[6]  
Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
[7]  
DAIN O, 2001, ACM WORKSH DAT MIN S, P1
[8]  
DAIN OM, 2002, IEEE WORKSH INF ASS, V6, P231
[9]  
Datar M, 2002, SIAM PROC S, P635
[10]  
DEBAR H, 2001, 4 INT S REC ADV INTR, V2212, P85