期刊文献+

通过关联报警重建攻击场景

Rebuilding Attack Scenarios through Correlating Alerts
下载PDF
导出
摘要 论文提出一系列的技术来整合两种互补型的报警关联方法:基于报警属性之间的相似性(聚类关联),和基于攻击的因果关系(因果关联)。尤其是根据入侵报警间的因果关系和它们需要满足的等同约束关系来假设和推理可能被IDSs漏报的攻击,同时使用一定的方法来整理假设的攻击重建更简单更可信的攻击场景。 This paper presents some techniques to integrate two complementary types of alert correlation methods:those based on the similarity between alert attributes(clustering correlation),and those based on causal correlation of attacks (causal correlation).Especially,this paper presents techniques to hypothesize and reason about attacks possibly missed by IDSs based on the equality constrain and causual relation between intrusion alerts they must satisfy.At the same time, this page uses the certain method to consolidate the hypothesized attacks in order to rebuild more simple and creditable attack scenarios.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第5期117-120,124,共5页 Computer Engineering and Applications
基金 国家自然科学基金重点资助项目(编号:90104030) 国家973基础研究发展规划资助项目(编号:G1999035801)
关键词 聚类关联 因果关联 假设攻击 等同约束 clustering correlation,causal correlation,hypothesize attack,equality constraint
  • 相关文献

参考文献8

  • 1P Ammann, D Wijesekera, S Kaushik.Scalable, graph-based network vulnerability analysis[C].In:Proceedings of the 9th ACM Conference on Computer and Communications Security,2002-11:217-224.
  • 2F Cuppens.Managing alerts in a multi-intrusion detection environment[C].Iu :Proceedings of the 17th Annual Computer Security Applications Conference, 2001-12.
  • 3F Cuppens,A Miege.Alert correlation in a cooperative intrusion detection framcwork[C].In:Proceedings of the 2002 IEEE Symposium on Security and Privacy,2002-05.
  • 4S Eckmann,G Vigna,R Kemmerer.STATL:An Attack Language for State-based Intrusion Detection[J].Journal of Computer Security,2002; 10(1/2) :71-104.
  • 5Interact Security Systems.RealSeeure intrusion detection system.http:// www.iss.net.
  • 6P Ning,D Reeves,Y Cui.Correlating Alerts Using Prerequisites of Intrusions[R].Technical Report,TR-2001-13,North Carolina State University, Department of Computer Science, 2001-12.
  • 7P Ning,D Xu.Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems[J].ACM Transactions on Information and System Security,2004.
  • 8张永,陆余良.多阶段网络攻击建模[J].网络安全技术与应用,2002(4):16-21. 被引量:3

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部