Alarm clustering for intrusion detection systems in computer networks

被引:75
|
作者
Perdisci, Roberto [1 ]
Giacinto, Giorgio [1 ]
Roli, Fabio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
computer security; intrusion detection; alarm clustering;
D O I
10.1016/j.engappai.2006.01.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Until recently, network administrators manually arranged alarms produced by intrusion detection systems (IDS) to attain a high-level description of cyberattacks. As the number of alarms is increasingly growing, automatic tools for alarm clustering have been proposed to provide such a high-level description of the attack scenarios. In addition, it has been shown that effective threat analysis requires the fusion of different sources of information, such as different IDS. This paper proposes a new strategy to perform alarm clustering which produces unified descriptions of attacks from alarms produced by multiple IDS. In order to be effective, the proposed alarm clustering system takes into account two characteristics of IDS: (i) for a given attack, different sensors may produce a number of alarms reporting different attack descriptions. and (ii) a certain attack description may be produced by the IDS in response to different types of attack. Experimental results show that the high-level alarms produced by the alarm clustering module effectively summarize the attacks, drastically reducing the volume of alarms presented to the administrator. In addition, these high-level alarms can be used as the base to perform further higher-level threat analysis. (C) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:429 / 438
页数:10
相关论文
共 50 条
  • [21] Analysis of intrusion detection and attack proliferation in computer networks
    Rangan, Prahalad
    Knuth, Kevin H.
    BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING, 2007, 954 : 443 - +
  • [22] Modelling and solving the intrusion detection problem in computer networks
    Beghdad, R
    COMPUTERS & SECURITY, 2004, 23 (08) : 687 - 696
  • [23] Threshold-based clustering for intrusion detection systems
    Nikulin, Vladimir
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
  • [24] A global security architecture for intrusion detection on computer networks
    Ganame, Abdoul Karim
    Bourgeois, Julien
    Bidou, Renaud
    Spies, Francois
    COMPUTERS & SECURITY, 2008, 27 (1-2) : 30 - 47
  • [25] Intelligent Distributed Intrusion Detection Systems of Computer Communication Systems
    Grzech, Adam
    2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 1 - 6
  • [26] Algorithm for automatic clustering number determination in networks intrusion detection
    Department of Computer Science and Information Engineering, Shanghai Institute of Technology, Shanghai 200235, China
    不详
    不详
    Ruan Jian Xue Bao, 2008, 8 (2140-2148):
  • [27] Rule extraction from neural networks for intrusion detection in computer networks
    Hofmann, A
    Schmitz, C
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1259 - 1265
  • [28] An Improved Kernel Clustering Algorithm Used in Computer Network Intrusion Detection
    He, Di
    Chen, Xin
    Zou, Danping
    Pei, Ling
    Jiang, Lingge
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [29] Anomaly intrusion detection by clustering transactional audit streams in a host computer
    Park, Nam Hun
    Oh, Sang Hyun
    Lee, Won Suk
    INFORMATION SCIENCES, 2010, 180 (12) : 2375 - 2389
  • [30] Intrusion Detection for Additive Manufacturing Systems and Networks
    Shaik, Seemaparvez
    Tunc, Cihan
    Morozov, Kirill
    2023 20TH ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, AICCSA, 2023,