Anais Do Simpósio Brasileiro De Sistemas De Informação (SBSI) 2016
DOI: 10.5753/sbsi.2016.5977
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Alert Correlation to Support Security Management

Abstract: To support information security, organizations deploy Intrusion Detection Systems (IDS) that monitor information systems and networks, generating alerts for every suspicious behavior. However, the huge amount of alerts that an IDS triggers and their low-level representation make the alerts analysis a challenging task. In this paper, we propose a new approach based on hierarchical clustering that supports intrusion alert analysis in two main steps. First, it correlates historical alerts to identify the most typ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Instead of relying on simple analysis techniques such as with Prelude-Correlator more sophisticated approaches as proposed in [25] are aimed to be integrated in the near future. Multiple techniques applied alongside in a hybrid fashion could improve the incident analysis capabilities.…”
Section: Discussionmentioning
confidence: 99%
“…Instead of relying on simple analysis techniques such as with Prelude-Correlator more sophisticated approaches as proposed in [25] are aimed to be integrated in the near future. Multiple techniques applied alongside in a hybrid fashion could improve the incident analysis capabilities.…”
Section: Discussionmentioning
confidence: 99%
“…For some IDS introduced problems, a few methods were proposed in our previous work [16,17], the redundant alerts, for example, can be reduced in the action extraction phase, and a few repeated action patterns can be removed in the session pruning phase by the pruning algorithm. In this paper, we mainly focus on the incomplete and disordered session (sequence) learning and attack pattern discovery in real-time.…”
Section: Methodsmentioning
confidence: 99%
“…where CR represents the correlation ratio, NPA represents the number of alarms correctly participating in the association, and TNA represents the total number of alarms. This paper selects two different alarm correlation analysis methods proposed in literature [40] and literature [41] to compare with the method proposed in this paper. Among them, literature [40] and literature [41] use a single alarm correlation method.…”
Section: Correlation Efficiency Analysismentioning
confidence: 99%
“…This paper selects two different alarm correlation analysis methods proposed in literature [40] and literature [41] to compare with the method proposed in this paper. Among them, literature [40] and literature [41] use a single alarm correlation method. It can be seen from Table 3 that our multitype mixed alarm correlation method is the method with the best correlation effect, and the correlation ratio reaches 96.7%, which is higher than the single correlation method.…”
Section: Correlation Efficiency Analysismentioning
confidence: 99%