An approach to the correlation of security events based on machine learning techniques

被引:10
作者
Stroeh, Kleber [1 ]
Roberto Mauro Madeira, Edmundo [2 ]
Goldenstein, Siome Klein [2 ]
机构
[1] Icaro Technol, Campinas, SP, Brazil
[2] Univ Estadual Campinas, UNICAMP, Inst Comp, Campinas, SP, Brazil
基金
巴西圣保罗研究基金会;
关键词
IDS; Security; Correlation; Machine learning;
D O I
10.1186/1869-0238-4-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations face the ever growing challenge of providing security within their IT infrastructures. Static approaches to security, such as perimetral defense, have proven less than effective-and, therefore, more vulnerable-in a new scenario characterized by increasingly complex systems and by the evolution and automation of cyber attacks. Moreover, dynamic detection of attacks through IDSs (Instrusion Detection Systems) presents too many false positives to be effective. This work presents an approach on how to collect and normalize, as well as how to fuse and classify, security alerts. This approach involves collecting alerts from different sources and normalizes them according to standardized structures-IDMEF (Intrusion Detection Message Exchange Format). The normalized alerts are grouped into meta-alerts (fusion, or clustering), which are later classified using machine learning techniques into attacks or false alarms. We validate and report an implementation of this approach against the DARPA Challenge and the Scan of the Month, using three different classifications-SVMs, Bayesian Networks and Decision Trees-having achieved high levels of attack detection with little false positives. Our results also indicate that our approach outperforms other works when it comes to detecting new kinds of attacks, making it more suitable to a world of evolving attacks.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 40 条
[1]  
AlFedaghi S, 2010, INT J NETW SECUR APP, V2, P58
[2]   Filtering events using clustering in heterogeneous security logs [J].
Asif-Iqbal H. ;
Udzir N.I. ;
Mahmod R. ;
Abd.Ghani A.A. .
Information Technology Journal, 2011, 10 (04) :798-806
[3]  
Bowen T, 2000, DARPA INF SURV C DIS
[4]   Stellar: A fusion system for scenario construction and security risk assessment [J].
Boyer, S ;
Dain, O ;
Cunningham, R .
THIRD IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2005, :105-116
[5]   Analysis of distributed intrusion detection systems using Bayesian methods [J].
Burroughs, DJ ;
Wilson, LF ;
Cybenko, GV .
CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, :329-334
[6]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[7]  
Chyssler T, 2004, P DET INTR MALW VULN, V46, P9
[8]  
Corona I, 2011, INFORM FUSION, V10, P274
[9]  
DEBAR H, 2007, 4765 RFC
[10]   TOWARD A THEORY OF SITUATION AWARENESS IN DYNAMIC-SYSTEMS [J].
ENDSLEY, MR .
HUMAN FACTORS, 1995, 37 (01) :32-64