期刊文献+

一种入侵场景构建模型——BPCRISM 被引量:3

BPCRISM:A New Intrusion Scenario Building Model
下载PDF
导出
摘要 就单一传统入侵检测系统而言,其异构性和自治性使得针对同一攻击行为产生的警报,在包含内容、详略程度、不确定性等方面存在很大的差异,导致大量重复性警报涌现.而这些大量、重复的警报信息不仅影响了入侵检测系统的性能,又不能体现出完整的黑客入侵过程.为了有效地分析和处理入侵警报,提出了一种入侵场景构建模型---BPCRISM,其能够利用警报的检测时间属性的接近程度将警报关联分为两大类:警报概率关联和警报因果关联,然后给出了概率关联和因果关联的算法,并从关联的警报信息中分辩出完整的黑客攻击流程和重构出入侵场景.初步实现该模型后,使用DARPA Cy-ber Panel Program Grand Challenge ProblemRelease3.2(GCP)入侵场景模拟器进行了测试,实验结果验证了该模型的有效性. Intrusion detection system (IDS) is the new generation of security-safeguard technology followed firewall and data encryption. Aiming at the same attack, traditional intrusion detection system (IDS) produce a lot of the repeated alerts which have quite difference in content, emphasis and uncertainty, because of its heterogeneity and autonomy. But by analyzing these alerts, the performance of IDS is reduced and the integrated intrusion course and scenario cannot be obtained. In order to analyze and deal the alerts effectively and to rebuild the attack flow and the attack scenario, a new intrusion scenario building model- BPCRISM (based probability and causal relation intrusion scenario model) that combines probabilistic correlation with causal correlation is presented in this paper. The method of the alert relation can be divided into two major categories: probabilistic alert correlation and based causal relation alert correlation, and then algorithms of two alert correlation methods are given. The integrated intrusion course can be identified and the intrusion scenario is built from the correlation alerts. Realizing this model tentatively, experiments are performed by using DARPA Cyber Panel Program Grand Challenge Problem Release 3.2 (GCP), which is an attack scenario simulator, and the effectiveness of the model is verified. This model can solve the problems a single traditional intrusion detection system brings.
出处 《计算机研究与发展》 EI CSCD 北大核心 2007年第4期589-597,共9页 Journal of Computer Research and Development
基金 河北省自然科学基金项目(F2004000133)
关键词 入侵检测 警报关联 入侵场景 概率关联 因果关联 correlation intrusion detection alert correlation intrusion scenario probabilistic correlation causal
  • 相关文献

参考文献8

  • 1O M Dain,R K Cunningham.Building scenarios from a heterogeneous alert stream[C].In:Proc of the 2001 IEEE Workshop on Information Assurance and Security.West Point,NY:United States Military Academy,2001.231-235
  • 2A Valdes,K Skinner.Probabilistic alert correlation[C].The 4th Int'l Symp on Recent Advances in Intrusion Detection,Davis,CA,2001
  • 3H Debar,A Wespi.Aggregation and corretation of intrusion detection alerts[G].In:Recent Advances in Intrusion Detection,Lecture Notes in Computer Science 2212.Berlin:Springer-Verlag,2001.85-103
  • 4Peng Ning,Yun Cui,Douglas S Reeves.Constructing attack scenarios through correlation of intrusion alerts[C].The 9th ACM Conf on Computer & Communications Security,Washington DC,2002
  • 5A Valdes,K Skinner.Probabilistic alert correlation[C].The 4th Int'l Symp on Recent Advances in Intrusion Detection (RAID 2001),Davis,CA,2001
  • 6D Curry,H Debar.Intrusion detection message exchange format data model and extensible markup language (XML)document type definition[OL].IETF.http://www.ietf.org/lid-abstracts.html,2003
  • 7李辉,郑庆华,韩崇昭,管晓宏.基于多假设跟踪的入侵场景构建研究[J].通信学报,2005,26(4):70-79. 被引量:7
  • 8DARPA Cyber Panel Program.DARPA cyber panel program grand challenge problem[OL].http://www.grandchallengeproblem.net,2003

二级参考文献11

  • 1DENNING D. An intrusion detection model[J]. IEEE Transactions on Software Engineering, 1987,13(2): 222-232.
  • 2HUANG M Y. WICKS T M. A large-scale distributed intrusion detection framework based on attack strategy analysis[A]. Web Proceedings of the First International Workshop on Recent Advances in Intrusion Detection (RAID'98)[C]. 1998.201-210.
  • 3DEBAR H, WESPI A. Aggregation and Correlation ofIntrusion-Detection Alerts[A]. Fourth International Symposium on Recent Advance in Intrusion erection[C]. 2001.85-103.
  • 4PENG N, YUN C, DOUGLAS S R. Analyzing intensive intrusion alerts via correlation[A]. Fifth International Symposium on Recent Advance in Intrusion Detection[C]. 2002.74-95.
  • 5DAIN O M, CUNNINGHAM R K. Building scenarios from a heterogeneous alert stream[A]. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security[C]. United States Military Academy, West Point, NY, 2001.5-6.
  • 6VALDES A, SKINNER K. Probabilistic Alert correlation[A]. Fourth International Symposium on Recent Advance in Intrusion Detection[C]. 2001.54-69.
  • 7REID D B. An algorithm for tracking multiple targets[J]. IEEE Transaction on Automatic Control, 1979, 24(6): 178-200.
  • 8CHAM T J, REHG J M. A multiple hypothesis approach to figure tracking[A]. Computer Vision and Pattern Recognition (CVPR 99)[C].Ft Collins, CO, 1999. 239-245.
  • 9ALBEROLA C, CYBENKO G V. Tracking with text-based messages[J]. Intelligent Systems, 1999, 14(4): 70-78.
  • 10The Truth about False Positivs[EB/OL]. http://.www.iss.net.

共引文献6

同被引文献16

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部