AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts

被引:15
|
作者
Husak, Martin [1 ]
Kaspar, Jaroslav [1 ]
机构
[1] Masaryk Univ, Inst Comp Sci, Brno, Czech Republic
关键词
intrusion detection; information sharing; alert correlation; prediction; data mining;
D O I
10.1145/3339252.3340513
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present AIDA, an analytical framework for processing intrusion detection alerts with a focus on alert correlation and predictive analytics. The framework contains components that filter, aggregate, and correlate the alerts, and predict future security events using the predictive rules distilled from historical records. The components are based on stream processing and use selected features of data mining (namely sequential rule mining) and complex event processing. The framework was deployed as an analytical component of an alert sharing platform, where alerts from intrusion detection systems, honeypots, and other data sources are exchanged among the community of peers. The deployment is briefly described and evaluated to illustrate the capabilities of the framework in practice. Further, the framework may be deployed locally for experimentations over datasets.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Real-time intrusion detection with emphasis on insider attacks
    Upadhyaya, S
    COMPUTER NETWORK SECURITY, 2003, 2776 : 82 - 85
  • [22] Towards Real-Time Intrusion Detection for NetFlow and IPFIX
    Hofstede, Rick
    Bartos, Vaclav
    Sperotto, Anna
    Pras, Aiko
    2013 9TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2013, : 227 - 234
  • [23] A Real-Time Intrusion Detection Algorithm for Network Security
    El-Bakry, Hazem M.
    Mastorakis, Nikos
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS, PTS I AND II: NEW ASPECTS OF APPLIED INFORMATICS AND COMMUNICATIONS, 2008, : 533 - +
  • [24] A Bayesian classification model for real-time intrusion detection
    Puttini, RS
    Marrakchi, Z
    Mé, L
    BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING, 2003, 659 : 150 - 162
  • [25] Network intrusion intelligent real-time detection system
    Zhao, Haibo
    Li, Jianhua
    Yang, Yuhang
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 1999, 33 (01): : 76 - 79
  • [26] Performance adaptation in real-time intrusion detection systems
    Lee, W
    Cabrera, JBD
    Thomas, A
    Balwalli, N
    Saluja, S
    Zhang, Y
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 252 - 273
  • [27] Real-time intrusion detection and suppression in ATM networks
    Bettati, R
    Zhao, W
    Teodor, D
    PROCEEDINGS OF THE WORKSHOP ON INTRUSION DETECTION AND NETWORK MONITORING (ID '99), 1999, : 111 - 118
  • [28] Real-Time Intrusion Detection in Power System Operations
    Valenzuela, Jorge
    Wang, Jianhui
    Bissinger, Nancy
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (02) : 1052 - 1062
  • [29] A real-time intrusion detection algorithm for network security
    El-Bakry, Hazem M.
    Mastorakis, Nikos
    2008, WSEAS (07):
  • [30] Fuzzy frequent episodes for real-time intrusion detection
    Luo, JX
    Bridges, SM
    Vaughn, RB
    10TH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3: MEETING THE GRAND CHALLENGE: MACHINES THAT SERVE PEOPLE, 2001, : 368 - 371