Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios

被引:0
|
作者
Godefroy, Erwan [1 ,2 ,3 ]
Totel, Eric [2 ]
Hurfin, Michel [3 ]
Majorczyk, Frederic [1 ]
机构
[1] DGA MI, Bruz, France
[2] Supelec, Rennes, France
[3] Inria, Rennes, France
关键词
Security and Protection; Intrusion detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In large distributed information systems, alert correlation systems are necessary to handle the huge amount of elementary security alerts and to identify complex multi-step attacks within the flow of low level events and alerts. In this paper, we show that, once a human expert has provided an action tree derived from an attack tree, a fully automated transformation process can generate exhaustive correlation rules that would be tedious and error prone to enumerate by hand. The transformation relies on a detailed description of various aspects of the real execution environment (topology of the system, deployed services, etc.). Consequently, the generated correlation rules are tightly linked to the characteristics of the monitored information system. The proposed transformation process has been implemented in a prototype that generates correlation rules expressed in an attack description language.
引用
收藏
页码:23 / 28
页数:6
相关论文
共 50 条
  • [31] CRAXweb: Automatic Web Application Testing and Attack Generation
    Huang, Shih-Kun
    Lu, Han-Lin
    Leong, Wai-Meng
    Liu, Huan
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE), 2013, : 208 - 217
  • [32] Automatic attack signature generation technology for malicious javascript
    Korea Internet and Security Agency, Seoul, Korea, Republic of
    Proc. Int. Conf. Model., Identif. Control, ICMIC, (351-354):
  • [33] Mining attack correlation scenarios based on multi-agent system
    Huang, Sisi
    Li, Zhitang
    Wang, Li
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: METHODS, TECHNIQUES AND TOOLS IN INFORMATION DESIGN, PT 1, PROCEEDINGS, 2007, 4557 : 632 - 641
  • [34] A new algorithm for automatic generation of fuzzy rules.
    Luciano, AM
    Napoli, E
    Schiavo, R
    NEW TRENDS IN FUZZY SYSTEMS, 1998, : 141 - 153
  • [35] AUTOMATIC-GENERATION OF PRODUCTION RULES FOR INTEGRITY MAINTENANCE
    CERI, S
    FRATERNALI, P
    PARABOSCHI, S
    TANCA, L
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1994, 19 (03): : 367 - 422
  • [36] Automatic generation of fuzzy rules for the control of a mobile robot
    Ouezri, Amel
    Derbel, Nabil
    Alimi, Adel M.
    Systems Analysis Modelling Simulation, 2002, 42 (07): : 1081 - 1105
  • [37] Automatic generation of fuzzy sensorimotor rules for mobile robotics
    Pipe, AG
    Carse, B
    Winfield, A
    FUZZ-IEEE '96 - PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3, 1996, : 2053 - 2058
  • [38] Automatic generation of fuzzy rules for reactive robot controllers
    Castellano, G
    Attolico, G
    Distante, A
    ROBOTICS AND AUTONOMOUS SYSTEMS, 1997, 22 (02) : 133 - 149
  • [39] Toward Automatic Generation of Intrusion Detection Verification Rules
    Massicotte, Frederic
    Labiche, Yvan
    Briand, Lionel C.
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 279 - +
  • [40] Attack Scenarios Generation Algorithm Based on Discrete Event System Formalism
    Raynaud, Alexis
    Serru, Théo
    Nguyen, Nga
    Ada User Journal, 2023, 44 (04): : 294 - 297