期刊文献+

一种基于关联的IDS告警分析模型 被引量:2

A Model of IDS Alert Analysis Based on Correlation
下载PDF
导出
摘要 针对现有入侵检测系统中存在告警量过大、误报率高的问题,运用过滤检测、相关性分析等方法,对原始告警信息进行二次处理.实验证明,该模型能有效缩减告警数量,降低误警率.同时,还能将告警结果按照危险级别进行分类统计,以图形化的方式报告给用户,从而达到预警的目的. Aiming at resolving the problem that currently IDS has overload alerts and high rate of false negative, this paper uses the method of filter testing and Correlation analysis to process the original alerts . Experiments show that the model is effective in reducing the number of alerts and false negative rate. At the same time, the system can classify and sum up alerts according to dangerous levels and show the graphic reports to users, so as to achieve the purpose of warning.
出处 《微电子学与计算机》 CSCD 北大核心 2008年第12期122-124,共3页 Microelectronics & Computer
基金 国家自然科学基金项目(60773053)
关键词 告警分析 相关性 误报警 入侵检测 alert analysis correlation false alert intrusion detection
  • 相关文献

参考文献6

二级参考文献23

  • 1王丽娜,徐巍,刘铸.基于相似度聚类分析方法的异常入侵检测系统的模型及实现[J].小型微型计算机系统,2004,25(7):1333-1336. 被引量:16
  • 2杨晶.蜜罐技术在IDS中的应用[J].网络安全技术与应用,2006(1):61-62. 被引量:9
  • 3Steven J Scott.Threat Management SystemThe State of Intrusion Detection [EB/OL].http://www.snort.org/docs/threatmanagement.pdf,2002-08-09/2003-05-06.
  • 4Stephen Northcutt.Network Intrusion Detection:An Analyst's Handbook [M].USA:New Riders Publishing,1999.
  • 5Brian Caswell,Marty Roesch.Snort Signature Database [EB/OL].http://www.snort.org/cgi-bin/done.cgi,2003-05-01/2003-05-06.
  • 6Larry,the Perl developers.Perl-Practical Extraction and Report Language[EB/OL].http://www.perldoc.com/perl5.8.5/pod/perl.html,2002-12-05/2003-02-12.
  • 7Rudy Lippan.DBD::mysql-MySQL driver for the Perl5 Database Interface[EB/OL].http://cpan.uwinnipeg.ca/htdocs/DBD-mysql/DBD/mysql.html,2003-01-25/2003-02-21.
  • 8LeonAtkinson.PHP核心编程(第2版) [M].北京:中国水利水电出版社,2001..
  • 9Ning P, Reeves D,Cui Y. Correlating alerts using prerequisites of intrusions: [Technical Report TR-2001-13]. North Carolina State University, Department of Computer Science, Dec. 2001.
  • 10Morin B,Debar H. Correlation of Intrusion Symptoms: an Application of Chronicles. In: Proc. of the 6th symposium on Recent Advances in Intrusion Detection (RAID 2003).

共引文献11

同被引文献15

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部