期刊文献+

Two-Stage Algorithm for Correlating the Intrusion Alerts

Two-Stage Algorithm for Correlating the Intrusion Alerts
下载PDF
导出
摘要 To solve the problem of the aleri flooding and information semantics in theexisting Intrusion Detection Sys-tem(IDS), we present a two-stage algorithm for correlating thealerts. In the first stage- the high-level alerts is integrated by using the Chronicle patternsbased on time intervals, which describe and match the alerts with the temporal time constrains of aninput sequence. In the second stage, the preparing relationship between the high-level alerts isdefined, which is applied to eorrtlatethe high-level alerts, and the attack scenario is constructedby drawing the attack graph. In the end a given example show? the performances of this two-stagecorrelation algorithm in decreasing the number and improving the information semantic of theintrusion alerts produced by the IDS. To solve the problem of the aleri flooding and information semantics in theexisting Intrusion Detection Sys-tem(IDS), we present a two-stage algorithm for correlating thealerts. In the first stage- the high-level alerts is integrated by using the Chronicle patternsbased on time intervals, which describe and match the alerts with the temporal time constrains of aninput sequence. In the second stage, the preparing relationship between the high-level alerts isdefined, which is applied to eorrtlatethe high-level alerts, and the attack scenario is constructedby drawing the attack graph. In the end a given example show? the performances of this two-stagecorrelation algorithm in decreasing the number and improving the information semantic of theintrusion alerts produced by the IDS.
出处 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期89-92,共4页 武汉大学学报(自然科学英文版)
基金 SupportedbytheNationalNaturalScienceFundationofChina(90204012)andHiTechResearchandDevelopmentProgramofChina(2002AA143021)
关键词 intrusion detection alert correlation partial ordering intrusion detection alert correlation partial ordering
  • 相关文献

参考文献3

  • 1Christophe Dousson.Alarm driven supervision for telecommunication network: II - On-line chronicle recognition[J].Annales Des Télécommunications (-).1996(9-10)
  • 2Dousson C.Alarm Driven Supervision for Telecommunication Networks: Online Chronicle Recognition[].Annals of Telecommunications.1996
  • 3Staniford S,Hoagland J,Alerney J M.Practical Automated Detection of Stealthy Portscans[].Journal of Computer Security.2002

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部