期刊文献+

基于层次聚类的警报处理方法 被引量:2

Alert Processing Method Based on Hierarchical Clustering
下载PDF
导出
摘要 针对入侵检测系统普遍存在冗余警报从而影响攻击类型判断的问题,文中提出了一种基于改进层次聚类的警报处理方法,其能减少冗余警报,提高攻击类型检测的准确性。该方法在层次聚类的基础上,使用警报的内容作为聚类的唯一属性值,增加了具有先验知识支撑的有效Alert占比来作为聚类阈值选取的标准,并改进了常规聚类直接抛弃高于阈值的类的处理方法,使用余弦相似度算法计算高于阈值的类的代表Alert,有效避免了有用警报的丢弃。在通过合适的阈值聚类后,按照时间轴的顺序来展示时间窗口内去重且聚类后的警报结果,以便对攻击者的攻击类型进行快速判断。实验结果表明,改进后的聚类方法有较好的去冗效果。 Aiming at the problem that there generally exist redundant alarms in intrusion detection system and it affects the judgment of attack types,this paper processed an alert processing method based on improved hierarchical clustering,so as to reduce redundant alarms and improve the accuracy of attack type detection.On the basis of hierarchical clustering,this method uses the content of alarm as the unique attribute value of cluster,increases the percentage of effective alert with prior knowledge as the criteria for the selection of clustering thresholds,and improves the processing method of directly discarding the class whose value is higher than threshold in conventional clustering.The improved method uses the cosine similarity algorithm to calculate the representative alert above the threshold class,effectively avoiding discarding useful alarms.After clustering through suitable thresholds,the deduplicated and clustered alarm results within the time window are displayed in the order of the time axis to quickly determine the attacker’s attack type.The experimental results show that the improved clustering method has better deduplicated effect.
作者 吴祎凡 崔艳鹏 胡建伟 WU Yi-fan;CUI Yan-peng;HU Jian-wei(Network Behavior Research Center,Xidian University,Xi’an 710071,China)
出处 《计算机科学》 CSCD 北大核心 2019年第4期203-209,共7页 Computer Science
关键词 SNORT 层次聚类 警报 阈值选取 相似度计算 Snort Hierarchical clustering Alert Threshold selection Similarity calculation
  • 相关文献

参考文献9

二级参考文献49

  • 1张亚玲,康立锦.基于数据挖掘的Snort系统改进模型[J].计算机应用,2009,29(2):409-411. 被引量:4
  • 2鲍旭华,戴英侠,冯萍慧,朱鹏飞,魏军.基于入侵意图的复合攻击检测和预测算法[J].软件学报,2005,16(12):2132-2138. 被引量:40
  • 3周涓,熊忠阳,张玉芳,任芳.基于最大最小距离法的多中心聚类算法[J].计算机应用,2006,26(6):1425-1427. 被引量:71
  • 4[2]Broderick J. IBM Outsourced Solution 1998 [EB/OL].http://www.infoworld.com/cgi-bin/displayTc.pl/980504sb3-ibm. htm/, 1998.
  • 5[3]Bloedom E, Hill B, Christiansen A, et al. Data Mining for Improving Intrusion Detection[EB/OL]. http://www. mitre. org/support/papers/tech_papers99_00/, 2000.
  • 6[4]Klaus Julisch. Clustering Intrusion Detection Alarms to Support Root Cause Analysis [J]. ACM Journal Name,2002, 2(3): 111-138.
  • 7中国国家计算机网应急技术处理协调中心[EB/OL].http://www.cert.org.ch/,2010.
  • 8NING P,XU D.Learning attack strategies from intrusion alerts[A].Proceedings of the 10th ACM Conference on Computer and Communications Security[C].Washington,D C,USA,2003.200-209.
  • 9QIN X,LEE W.Statistical causality analysis of INFOSEC alert data[A].Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection[C].Pittsburgh,USA,2003.73-94.
  • 10QIN X,LEE W.Discovering novel attack strategies from INFOSEC alerts[A].Proceedings of the 9th European Symposium on Research in Computer Security[C].Sophia Antipolis,France,2004.439-456.

共引文献90

同被引文献17

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部