An approach to the correlation of security events based on machine learning techniques

被引:10
作者
Stroeh, Kleber [1 ]
Roberto Mauro Madeira, Edmundo [2 ]
Goldenstein, Siome Klein [2 ]
机构
[1] Icaro Technol, Campinas, SP, Brazil
[2] Univ Estadual Campinas, UNICAMP, Inst Comp, Campinas, SP, Brazil
基金
巴西圣保罗研究基金会;
关键词
IDS; Security; Correlation; Machine learning;
D O I
10.1186/1869-0238-4-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations face the ever growing challenge of providing security within their IT infrastructures. Static approaches to security, such as perimetral defense, have proven less than effective-and, therefore, more vulnerable-in a new scenario characterized by increasingly complex systems and by the evolution and automation of cyber attacks. Moreover, dynamic detection of attacks through IDSs (Instrusion Detection Systems) presents too many false positives to be effective. This work presents an approach on how to collect and normalize, as well as how to fuse and classify, security alerts. This approach involves collecting alerts from different sources and normalizes them according to standardized structures-IDMEF (Intrusion Detection Message Exchange Format). The normalized alerts are grouped into meta-alerts (fusion, or clustering), which are later classified using machine learning techniques into attacks or false alarms. We validate and report an implementation of this approach against the DARPA Challenge and the Scan of the Month, using three different classifications-SVMs, Bayesian Networks and Decision Trees-having achieved high levels of attack detection with little false positives. Our results also indicate that our approach outperforms other works when it comes to detecting new kinds of attacks, making it more suitable to a world of evolving attacks.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 40 条
[11]  
Faraoun K. M., 2006, Malaysian Journal of Computer Science, V19, P9
[12]   GENETIC PROGRAMMING APPROACH FOR MULTI-CATEGORY PATTERN CLASSIFICATION APPLIED TO NETWORK INTRUSIONS DETECTION [J].
Faraoun, K. M. ;
Boukelif, A. .
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2006, 6 (01) :77-99
[13]   A global security architecture for intrusion detection on computer networks [J].
Ganame, Abdoul Karim ;
Bourgeois, Julien ;
Bidou, Renaud ;
Spies, Francois .
COMPUTERS & SECURITY, 2008, 27 (1-2) :30-47
[14]  
Gerg Christopher, 2004, MANAGING SECURITY SN
[15]  
Grimaila M, 2011, J DEFENSE MODEL SIMU, P1
[16]   Secur(e/ity) management: A continuing uphill climb [J].
Hale, John ;
Brusil, Paul .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2007, 15 (04) :525-553
[17]   Towards application driven security dashboards in future middleware [J].
Joosen, Wouter ;
Lagaisse, Bert ;
Truyen, Eddy ;
Handekyn, Koen .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2012, 3 :107-115
[18]  
Julisch K., 2003, ACM Transactions on Information and Systems Security, V6, P443, DOI 10.1145/950191.950192
[19]  
Kayacik HG, 2003, TECH REP
[20]  
Lan F, 2010, FRAMEWORK NETWORK SE