Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts

被引:116
作者
Wang, Lingyu [1 ]
Liu, Anyi [1 ]
Jajodia, Sushil [1 ]
机构
[1] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
intrusion detection; alert correlation; vulnerability analysis; intrusion prevention;
D O I
10.1016/j.comcom.2006.04.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods usually employ an in-memory index for fast searches among received alerts. With finite memory, the index can only be built on a limited number of alerts inside a sliding window. Knowing this fact, an attacker can prevent two attack steps from both falling into the sliding window by either passively delaying the second step or actively injecting bogus alerts between the two steps. In either case, the correlation effort is defeated. In this paper, we first address the above issue with a novel queue graph (QG) approach. Instead of searching all the received alerts for those that prepare for a new alert, we only search for the latest alert of each type. The correlation between the new alert and other alerts is implicitly represented using the temporal order between alerts. Consequently, our approach can correlate alerts that are arbitrarily far away, and it has a linear (in the number of alert types) time complexity and quadratic memory requirement. Then, we extend the basic QG approach to a unified method to hypothesize missing alerts and to predict future alerts. Finally, we propose a compact representation for the result of alert correlation. Empirical results show that our method can fulfill correlation tasks faster than an IDS can report alerts. Hence, the method is a promising solution for administrators to monitor and predict the progress of intrusions and thus to take appropriate countermeasures in a timely manner. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:2917 / 2933
页数:17
相关论文
共 45 条
[1]  
Ammann P., 2002, 9 ACM C COMPUTER COM, DOI DOI 10.1145/586110.586140
[2]  
[Anonymous], TCPREPLAY PCAP EDITI
[3]  
[Anonymous], 2001, Proceeding of the 2001 ACM Workshop on Data Mining for Security Applications
[4]  
[Anonymous], 2002, P 8 ACM SIGKDD INT C, DOI DOI 10.1145/775047.775101
[5]  
[Anonymous], 2001, P 2001 IEEE WORKSH I
[6]  
CHINCHANI AR, 2005, P IEEE INT C DEP SYS
[7]  
Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
[8]  
CUPPENS F, 2001, P 3 INT S REC ADV IN, P197
[9]  
Cuppens F., 2001, P 17 ANN COMP SEC AP
[10]  
Dacier M., 1994, THESIS I NATL POLYTE