2002
DOI: 10.1007/3-540-36084-0_7
|View full text |Cite
|
Sign up to set email alerts
|

M2D2: A Formal Data Model for IDS Alert Correlation

Abstract: Abstract. At present, alert correlation techniques do not make full use of the information that is available. We propose a data model for IDS alert correlation called M2D2. It supplies four information types: information related to the characteristics of the monitored information system, information about the vulnerabilities, information about the security tools used for the monitoring, and information about the events observed. M2D2 is formally defined. As far as we know, no other formal model includes the vu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
88
0
1

Year Published

2004
2004
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 179 publications
(90 citation statements)
references
References 14 publications
0
88
0
1
Order By: Relevance
“…A description of the network installation is required and can be, for example, specified in a formal model such as M2D2 [MMDD02] or using hypergraphs [Vi03].…”
Section: Passive Verificationmentioning
confidence: 99%
“…A description of the network installation is required and can be, for example, specified in a formal model such as M2D2 [MMDD02] or using hypergraphs [Vi03].…”
Section: Passive Verificationmentioning
confidence: 99%
“…Broadly speaking, these approaches can be divided into several groups: alert aggregation techniques [1,12,13] that cluster similar alerts; the methods focused on detection accuracy improvement [14,15,16] that aim to improve the accuracy of intrusion detection often through filtering of false positive and low-interest alerts; the methods for alert prioritization [17,18,19] that focus on adjusting priority of alerts based on their severity; and alert causality analysis. Since our work employs the alert causality analysis, we will primarily focus on the related work in this area.…”
Section: Related Workmentioning
confidence: 99%
“…-In environments with multiple IDSs, some methods enhance the confidence of alerts generated by more than one IDS (based on the assumption that the real attack will be noticed by multiple IDSs, whereas false positives tend to be more random) [32], -Couple sensor alerts with background knowledge to determine whether the attacked system is vulnerable [22,32], -Create groups of alerts and use heuristics to evaluate whether an alert is a false positive [7,45]. The work by Dain and Cunningham [7] is particularly relevant to us as it uses machine learning techniques: neural networks and decision trees to build a classifier grouping alerts into so-called scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…False positives, i.e., alerts that mistakenly indicate security issues and require attention from the intrusion detection analyst, are one of the most important problems faced by intrusion detection today [32]. In fact, it has been estimated that up to 99% of alerts reported by IDSs are not related to security issues [2,4,17].…”
Section: Introductionmentioning
confidence: 99%