期刊文献+

基于搜索树的告警高效聚类算法和Bayes分类器的设计和研究 被引量:3

Design and Research of an Alert Clustering Algorithm Based on Search Tree and an Alert Classified Method Based on Bayesian Classifier
下载PDF
导出
摘要 如何从IDS等安全产品每天产生的海量告警和日志中挖掘出有价值的信息,帮助管理员找到那些真正具有威胁的攻击,然后采取措施,有效地保护系统安全,这是入侵检测系统急待解决的问题。本文利用搜索树可以减少搜索空间和覆盖向量的特点提出了基于搜索树的高效告警聚类算法;考虑到把新来的告警事件归类到先前通过聚类得到的类中,让其与其他的告警事件可以关联起来,提出了基于贝叶斯事件分类器的告警分类方法。最后使用KDDCup1999Data的数据进行了性能测试。实验测试结果表明,此算法和方法是快速有效的。在原型系统“多信息源智能化安全强审计系统”中的实际应用也展现了其良好的应用前景。 How to effectively find out valuable abnormal behaviors from the numerous alarms and logs produced by all kinds of security products everyday, all of them must be analyzed and the true and non-redundant information should be extracted, which is helpful to find the real problem and then correcting actions can be taken to protect the safety of systern. This is one of the biggest challenges which IDS is facing. In this paper, taking into account search tree which can decrease searching space and overlay vector, an alert clustering algorithm based on search tree is presented. So as to classify new alert and can have correlation with other alert, an alert classified method based on Bayesian classifier is emphatically proposed. At last, KDD Cup 1999 Data is used to evaluate the performance of algorithm, and the experiment results show the high efficiency of the algorithm. The applications of them to Multi-information-source intelligential security auditing system indicate that they will have a good future for implementation.
机构地区 中科院计算所
出处 《计算机科学》 CSCD 北大核心 2006年第8期190-194,共5页 Computer Science
基金 国家863"网络安全管理和预警防御系统"(2002AA142030) "多信息源智能化安全强审计系统"(2003AA148020)资助 "可信计算系统平台"(2005AA142030)资助
关键词 告警关联 贝叶斯分类器 搜索树算法 聚类 Alert correlation, Bayesian classifier, Search tree algorithm, Clustering
  • 相关文献

参考文献26

  • 1Haines J, Ryder D K, Tinnel L, et al. Validation of Sensor Alert Correlators. IEEE Security & Privacy Magazine, 2003, 1 (1) : 46-56
  • 2Cuppens F, Miege A. Alert correlation in a cooperative intrusion detection framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, May 2002
  • 3Vigna G, Kemmerer R A.- NetS;FAT: A network-based intrusion detection system. Journal of Computer Security, 1999,7 (1) : 3771
  • 4Kendall K. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems. June 1999
  • 5Debar H, Wespi A. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, 2001.85-103
  • 6Cuppens F. Managing alerts in a multi-intrusion detection environment. In: 17^th Annual Computer Security Applications Conferenee(ACSAC). New-Orleans, December 2001
  • 7McHugh J. Intrusion and Intrusion Detection. International Journal of Information Security. 2001,1 (1) : 14 -35
  • 8Sengupta A, Dalkilic M. DSQL - An SQL for Structured Documents. In:Lecture Notes in Computer Science vol 2348. Proceedings of the 14^th International Conference on Advanced Information Systems Engineering(CAISE'02). Toronto, Canada. 2002. 757-760
  • 9American National Standards Institute New York: ANSI X3H2 standards group(1996)
  • 10Codd E. A relational model for large shared data banks. Communications of the ACM, 1970,6:377-387

共引文献2

同被引文献28

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部