期刊文献+

网络安全事件的关联分析方法的比较研究 被引量:8

Correlation Analysis Summarization of Network Security Event
原文传递
导出
摘要 随着当前攻击手段和技术的日益复杂化,一次入侵事件往往需要多个步骤才能完成,这些步骤都是彼此相关的。但是传统的入侵检测集中于检测底层的入侵或异常,所检测到的结果也仅仅是一次完整入侵的一部分,所以不能将不同的报警结合起来以发现入侵的逻辑步骤或者入侵背后的攻击策略。关联分析技术将不同分析器上产生的报警进行融合与关联分析,极大地减少了报警的数量,降低了入侵检测的误报率,并且适当的减少了入侵检测的漏报率。文中在对网络安全事件关联分析方法的系统结构进行分析后,着重介绍了当前比较流行的几种网络安全事件关联分析方法,最后对各种方法进行了比较研究。 With the development of attack means and complex technologies, an intrusion detection system event commonly needs many steps to be successful. Tranditional intrusion detections focus on intrusion or abnormality at bottom layer, so they can not combine various types of alerts to find logical steps of attack policies behind the intrusions. Correlation technologies combine the alerts from different analyzers and correlate them, which greatly reduce the numbers of alerts, decrease the false positive and false negative properly. This article firstly analysizes the system structure of correlation means of network secure events, then stressly introduces several popular ways of network secure events correlation analysises.
出处 《信息安全与通信保密》 2006年第2期75-79,共5页 Information Security and Communications Privacy
基金 该项目获得国家网络与信息安全保障持续发展计划(2004研1-917-021)资助同时受到华中科技大学天华网络信息安全研究所的支持
关键词 入侵检测 安全事件 关联分析 报警 intrusion detection secure event correlation analysis alerts
  • 相关文献

参考文献12

  • 1[1]Valdes A,Skinner K.Probabilistic Alert Correlation[A].Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001)[C],2001:54-68
  • 2[2]Dain O,Cunningham R K.Fusing a Heterogeneous Alert Stream into Scenarios[A].Proceedings of the 2001 ACM Workshop on Data Mining for Security Applications[C],2001:1-13
  • 3[3]Debar H,WespiA.Aggregation and Correlation of Intrusion-Detection Alerts.In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection(RAID).2001.number 2212 in Lecture Notes in Computer Sciences,pages 85-103,Davis,CA,USA,October 2001.Springer
  • 4[4]Guofei Jiang,Member,IEEE and George Cybenko,Fellow,IEEE.temporal and Spatial distributed Event correlation for Network Security.Proceeding of the 2004 American Control conference Boston,Massachusetts June 30.July2,2004
  • 5[5]Ning P,Cui Y,Reeves D S.Constructing attack scenarios through correlation of intrusion alerts.presented at Proceedings of the 9th ACM Conference on Computer and Communications Security,Nov 18-22 2002,Washington,DC,United States,2002
  • 6[6]Ning P,Xu D.Learning attack strategies from intrusion alerts.presented at Proceedings of the 10th ACM Conference on Computer and Communications Security,CCS 2003,Oct 27-31 2003,Washington,DC,United States,2003
  • 7[7]Ning P,Cui Y Reeves D S,et al.D.Xu,Techniques and tools for analyzing intrusion alerts.ACM Transactions on Information and System Security,2004;7:274
  • 8[8]Ning P,Xu D.Alert correlation through triggering events and common resources.Tucson,AZ,USA,2004
  • 9[9]Jakobson G,Lemmon A,Weissman M.Knowledge-based GUI for network surveillance and fault analysis.presented at Proceedings of NOMS '94-IEEE Network Operations and Management Symposium,14-18 Feb.1994,Kissimmee,FL,USA,1994
  • 10[10]Jakobson G,Weissman M,Brenner L,et al.C.GRACE:building next generation event correlation services.presented at NOMS 2000:IEEE/IFIP Network Operations and Management Symposium 'The Networked Planet:Management Beyond 2000',Apr 10-Apr 14 2000,Honolulu,HI,USA,2000

同被引文献35

引证文献8

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部