Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection

被引:59
作者
Meng, Weizhi [1 ]
Li, Wenjuan [2 ]
Kwok, Lam-For [2 ]
机构
[1] Inst Infocomm Res, Infocomm Secur Dept, Singapore, Singapore
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
intelligent system; alarm filtration; alert verification; network intrusion detection;
D O I
10.1002/sec.1307
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection systems (NIDSs) have been widely deployed in various network environments to defend against different kinds of network attacks. However, a large number of alarms especially unwanted alarms such as false alarms and non-critical alarms could be generated during the detection, which can greatly decrease the efficiency of the detection and increase the burden of analysis. To address this issue, we advocate that constructing an alarm filter in terms of expert knowledge is a promising solution. In this paper, we develop a method of knowledge-based alert verification and design an intelligent alarm filter based on a multi-class k-nearest-neighbor classifier to filter out unwanted alarms. In particular, the alarm filter employs a rating mechanism by means of expert knowledge to classify incoming alarms to proper clusters for labeling. We further analyze the effect of different classifier settings on classification accuracy with two alarm datasets. In the evaluation, we investigate the performance of the alarm filter with a real dataset and in a network environment, respectively. Experimental results indicate that our alarm filter can effectively filter out a number of NIDS alarms and can achieve a better outcome under the advanced mode. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3883 / 3895
页数:13
相关论文
共 39 条
  • [1] Alfonso Valdes, 1995, TECHNICAL REPORT
  • [2] Alharby A, 2005, LECT NOTES COMPUT SC, V3531, P192
  • [3] Aly M., 2005, Survey on Multiclass Classification Methods Extensible algorithms, V19, P2
  • [4] [Anonymous], 2012, Internet security threat report, V17
  • [5] Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
  • [6] Bolzoni D, 2007, USENIX ASSOCIATION PROCEEDING OF THE 21ST LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, P141
  • [7] Chiu CY, 2010, LECT NOTES ARTIF INT, V6171, P595, DOI 10.1007/978-3-642-14400-4_46
  • [8] Geramiraz Farzaneh, 2012, International Journal of Network Security, V14, P352
  • [9] Detecting anomalous and unknown intrusions against programs
    Ghosh, AK
    Wanken, J
    Charron, F
    [J]. 14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 259 - 267
  • [10] Goel Radhika, 2012, INT J NETWORK SECURI, V14, P211