期刊文献+

基于地址关联图的分布式IDS报警关联算法 被引量:4

An algorithm of alert correlation based on address correlation graph in distributed intrusion detection system
下载PDF
导出
摘要 当前入侵检测系统产生的报警洪流往往使管理员无法处理,大大降低了IDS系统的有效性.对原始报警事件的关联分析可以从大量报警中提取出有效的攻击事件;分析攻击者的真正意图,对大规模分布式入侵检测系统有重要意义.为此综合分析了现有报警关联算法的优点和不足,提出了一种基于地址关联图(ACG)的报警关联算法.该算法用地址关联图模型对分布式IDS原始报警事件进行分析,以得到不同攻击之间的关联和发生步骤,得到攻击者的攻击路径,进而分析攻击者的意图.该算法无需提前制定关联知识库或提前训练关联模型,因此易于实现. The alert flood of current IDSes often overwhelms the security administrators,which largely decreases the effectiveness of IDS.The correlation of original alerts plays an important role in distributed IDS,which can draw out the effective attacks from a large number of alerts,and analyze the real intension of attackers.In this paper,the merits and defects of typical correlation algorithms are analyzed.An algorithm of alert correlation based on address correlation graph(ACG) is proposed here.The algorithm can be used to analyze the original alerts with ACG model,which can get the intrusion path of attackers through the relation and steps of different attacks,and then analyze the intension of attackers.The algorithm is easy to be implemented because it does not depend on a predefined base of correlation knowledge or a forehand training of correlation model.
出处 《大连理工大学学报》 EI CAS CSCD 北大核心 2005年第z1期126-131,共6页 Journal of Dalian University of Technology
基金 国家自然科学基金资助项目(60203004) 国家高技术研究发展计划863资助项目(2003AA142080)
关键词 入侵检测系统 报警 关联 地址关联图 IDS alert correlation ACG
  • 相关文献

参考文献11

  • 1[1]LEWIS L. A case-based reasoning approach to the management of faults in communication networks[J]. IFIP Trans. C-Comms Systems, 1993, 12: 671-682.
  • 2[2]KLIGER S, YEMINI S, YEMINI Y. A coding approach to event correlations[A]. Proceeding of the 6th IFIP/IEEE International Symposium on Integrated Network Management[C]. London:Chapmanand Hall, 1995:266-277.
  • 3[3]AKOBSON G, WEISSMAN M D. Alarm correlation[J]. IEEE Network, 1993, 7(6):52-59.
  • 4[4]HASAN M, SUGLA B, VISWANATHAN R. A conceptual framework for network management event correlation and filtering system[A]. SLOMAN M, MAZUMDAR S, LUPU E. Intonation Network Management VI[C]. London: Champman Hall, 1999:233-246.
  • 5[5]VALDES A, SKINNER K. Probabilistic alert correlation[R]. RAID 2001, 2001:54-68.
  • 6[6]STANIFORD S, HOAGLAND J A, MCALEMEY J M. Practical automated detection of stealthy portscans[J]. Journal of Computer Security, 2002, 10:105-136.
  • 7[7]DAIN O, CONNINGHAM R K. Fusing a heterogeneous alert stream into scenarios[A]. Proceedings of the 2001 ACM Workshop on Data Mining for Security Applications[C].[S.l.]:[s.n.], 2001:1-13.
  • 8[8]DEBAR H, WESPI A. Aggregation and correlation of intrusion-detection alerts[R]. RAID 2001, 2001:85-103.
  • 9[9]NING P, CUI Y. An intrusion alert correlator based on prerequisites of intrusions[A]. Technical Report TR-2002[M]. [S.l.]:North Carolina State University, Department of Computer Science, 2002[2002-06-05]. Http://uther.dlib.vt.edu/~ncstrlh/cgi-bin/OAINCSTRL_union/UI/search.pl?related=oai:ncsu_cs:TR-2003-16.
  • 10[10]PORRAS P A, FONG M W, VALDES A. A mission-impact-based approach to INFOSEC alarm correlation[A]. RAID 2002[M]., 2002:95-114.

同被引文献41

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部