期刊文献+

安全报警关联技术研究 被引量:4

Security Alert Correlation:A Survey
下载PDF
导出
摘要 安全报警关联技术是近年来安全领域中的热点之一,它能够有效地解决目前困扰安全管理者的海量报警以及误报、漏报报警等问题。近年来该领域出现了大量有价值的研究成果,但已有工作大多集中在个别子领域,整个领域的发展并不均衡。对这一技术的研究现状进行了综述,介绍了其处理过程及体系结构,重点总结比较了报警聚类及融合、攻击场景重建和攻击意图识别这3个关键阶段的已有算法,之后又总结评述了目前报警关联的主要应用、技术难点及现有解决方案,最后对该领域面临的问题加以分析,并展望了未来方向。 Alert correlation is a new promising technology and has drawn more and more attentions in recent years. It can efficiently solve many problems bothering security managers now, such as high false positives (i. e. alerts mistakenly triggered by benign events) , high false negatives (i. e. intrusions mistakenly missed by security mechanisms) , and large amounts of alerts created by security products per day. In the past several years, a lot of vulnerable researches were done in this field,but most of them only focused on few issues. And there are still many challenging problems that have not been addressed wcll,or even not been touched. Researchers of this field need put more efforts into them in the future.This paper gave an overview of the research progress in this area. Firstly, we introduced the common process and the popular architectures of current alert correlation systems. hhen we summarized and compared the main algorithms of three key phases (i. e. alert aggregation and fusing, attack scenarios constructing, and attack plan recognition) in the common process. After these, the main applications of this technology were introduced, and the difficulties and corresponding methods were summarized. At the end of this paper, we analyzed the shortages of current work and the possible new directions in this field.
作者 伏晓 谢立
出处 《计算机科学》 CSCD 北大核心 2010年第5期9-14,29,共7页 Computer Science
基金 2005年国家信息安全重大专项基金项目 国家"八六三"高技术研究发展计划项目基金(2003AA142010)资助
关键词 报警关联 报警聚类 报警融合 攻击场景重建 攻击意图识别 Alert correlation Alert aggregation Alert fusing Attack scenarios constructing Attack plan recognition
  • 相关文献

参考文献41

  • 1Clifton C, Gengo G. Developing custom intrusion detection filters using data mining[C]//Proceedings of MILCOM 2000. Washington DC: IEEE Computer Society Press, 2000 : 440-443.
  • 2Maggi F,Zanero S. On the use of different statistical tests for alert correlation[C]//Proc, of RAID 2007. Heidelberg: Springer Berlin,2007:167-177.
  • 3Goldman R P, Heimerdinger W, et al. Information modeling for intrusion report aggregation[C]//Proc, of DISCEX'01. Washington DC: IEEE Computer Society Press, 2001:329-343.
  • 4Porras P A, Fong M W, Valdes A. A mission impact based approach to INFOSEC alarm correlation[C]//Proc. of RAID 2002. Heidelberg: Springer Berlin, 2002 :95-114.
  • 5Abad C, Taylor J, Sengul C, et al. Log correlation for intrusion detection a proof of concept[C]//Proc. of ACSAC 2003. Washington DC: IEEE Computer Society Press, 2003 : 255- 264.
  • 6Christopher K, Fredrik V, Giovanni V. Intrusion detection and eorrelation: challenges and solutions[M]. Berlin: Springer, 2005.
  • 7Peng Ning, Yun Cui, Reeves D S. Constructing attack scenarios through correlation of intrusion alerts[C]//Proc, of ACM CCS 2002. New York: ACM Press, 2002:245-254.
  • 8Debar H,Wespi A. Aggregation and correlation of intrusion-detection alerts[C]//Proc. of RAID 2001. Heidelberg: Springer Berlin, 2001 : 85-103.
  • 9Autrel F, Cuppens F. Using an intrusion detection alert similarity operator to aggregate and fuse alerts[C]//Proc, of SAR 2005. 2005 : 1-10.
  • 10Qin X, Lee W. Statistical causality analysis of INFOSEC alert data[C]///Proc.of RAID 2003. Heidelberg: Springer Berlin,2003:73-93.

同被引文献126

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部