Alert Correlation Approach Based on HMM

سال انتشار: 1393
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 890

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICEEE06_046

تاریخ نمایه سازی: 1 مهر 1394

چکیده مقاله:

Huge amounts of low level alerts are daily reported by IDS.Particularly, the large number of which are false positives.A very large quantity of false positives alerts makes it difficult for the security manager to analysis them; thus, in order to cope with such quantities of alerts, alert correlation approaches have been used.In this paper, we describe an architecture for alert correlation based on Hidden Markov Model. Our aim is to reduce the alert redundancy and an extract attack scenario among alerts.An aggregation and correlation module are vital modules of our method. The aggregation module is used to combine the same alerts together. The outcomes of this module are hyper alerts. Afterward, hyper alerts are mapped to the states of the HMM, then the correlation engine estimates the correlation between two hyper alerts among the states. Finally, in order to discover an attack scenario we considered the correlation value between two hyper alerts , so an attack scenario is illustrated by the graph of nodes and edges. The most important point of our approach is that attack scenarios can be detected online without expert knowledge. The efficiency of our proposed approach is evaluated using both the DARPA 2000 dataset and the live traffic data collected from a Honey net network. The experimental results show that the correlation model is effective in achieving alert reduction and discovering the attack scenario.

نویسندگان

Fatemeh Vafaei Nejad

Electrical,Computer and Biomedical Engineering Dep. Qazvin Branch, Islamic Azad UniversityQazvin, Iran

Behzad Akbari

Electrical and Computer Engineering Dep. Tarbiat Modares University Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • K. Alsubhi, I. Aib, and R. Boutaba, EuzMet: a fuzzy- ...
  • B. Zhu and A. Ghorbani, Alert correlation for extracting attack ...
  • H. Farhadi, M. AmirHaeri, and M. Khansari, Alert Correlation and ...
  • M. Khosronejad, E. Sharififar, H. A. Torshizi, and M. Jalali, ...
  • & Application, vol. 6, no. 5, 2013. ...
  • _ _ _ Network, IEEE, vol. 23, no. 1, pp. ...
  • C. Kruegel, F. Valeur, and G. Vigna, Intrusion detection and ...
  • R. Rangadurai Karthick, v. P. Hattiwale, and B. Ravindran, Adaptive ...
  • Fourth International Conference on, 2012, pp. 1-7. ...
  • th Iranian Conference On Electrical and Electronics Engineering (ICEEE2014) ...
  • Islamic Azad University Gonabad Branch August 19, 20, 21 - ...
  • _ _ _ _ _ _ _ _ IEEE Transactions ...
  • _ 2000 darpa intrusion detection scenare specific ...
  • TIAA: A Toolkit for Intrusion Alert Analysis. North Carolina State ...
  • نمایش کامل مراجع