Affiliation:
1. North Carolina State University, Raleigh, NC
Abstract
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections between them. In situations where there are intensive attacks, not only will actual alerts be mixed with false alerts, but the amount of alerts will also become unmanageable. As a result, it is difficult for human users or intrusion response systems to understand the alerts and take appropriate actions. This paper presents a sequence of techniques to address this issue. The first technique constructs attack scenarios by correlating alerts on the basis of
prerequisites
and
consequences
of attacks. Intuitively, the prerequisite of an attack is the necessary condition for the attack to be successful, while the consequence of an attack is the possible outcome of the attack. Based on the prerequisites and consequences of different types of attacks, the proposed method correlates alerts by (partially) matching the consequences of some prior alerts with the prerequisites of some later ones. Moreover, to handle large collections of alerts, this paper presents a set of interactive analysis utilities aimed at facilitating the investigation of large sets of intrusion alerts. This paper also presents the development of a toolkit named TIAA, which provides system support for interactive intrusion analysis. This paper finally reports the experiments conducted to validate the proposed techniques with the 2000 DARPA intrusion detection scenario-specific datasets, and the data collected at the DEFCON 8 Capture the Flag event.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference38 articles.
1. AT&T Research Labs. GraphViz---Open Source Graph Layout and Drawing Software. Available at http://www.research.att.com/sw/tools/graphviz/.]] AT&T Research Labs. GraphViz---Open Source Graph Layout and Drawing Software. Available at http://www.research.att.com/sw/tools/graphviz/.]]
Cited by
119 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fusion Analysis of Intelligent Connected Vehicle Security Events Based on Multidimensional Heterogeneous Data;Communications in Computer and Information Science;2024
2. Enhancing Security in 5G Networks: A Hybrid Machine Learning Approach for Attack Classification;2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA);2023-12-04
3. Temporal-Gated Graph Neural Network with Graph Sampling for Multi-step Attack Detection;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01
4. Research on university network security situation assessment model;International Conference on Computer Network Security and Software Engineering (CNSSE 2023);2023-06-26
5. An effective attack scenario construction model based on identification of attack steps and stages;International Journal of Information Security;2023-05-28