首页> 外文OA文献 >A framework for correlation and aggregation of security alerts in communication networks. A reasoning correlation and aggregation approach to detect multi-stage attack scenarios using elementary alerts generated by Network Intrusion Detection Systems (NIDS) for a global security perspective.
【2h】

A framework for correlation and aggregation of security alerts in communication networks. A reasoning correlation and aggregation approach to detect multi-stage attack scenarios using elementary alerts generated by Network Intrusion Detection Systems (NIDS) for a global security perspective.

机译:通信网络中安全警报的关联和聚合框架。一种推理相关和聚合方法,可使用网络入侵检测系统(NIDS)生成的基本警报来检测多阶段攻击情形,以实现全球安全性。

摘要

The tremendous increase in usage and complexity of modern communication and network systems connected to the Internet, places demands upon security management to protect organisations¿ sensitive data and resources from malicious intrusion. Malicious attacks by intruders and hackers exploit flaws and weakness points in deployed systems through several sophisticated techniques that cannot be prevented by traditional measures, such as user authentication, access controls and firewalls. Consequently, automated detection and timely response systems are urgently needed to detect abnormal activities by monitoring network traffic and system events. Network Intrusion Detection Systems (NIDS) and Network Intrusion Prevention Systems (NIPS) are technologies that inspect traffic and diagnose system behaviour to provide improved attack protection.udThe current implementation of intrusion detection systems (commercial and open-source) lacks the scalability to support the massive increase in network speed, the emergence of new protocols and services. Multi-giga networks have become a standard installation posing the NIDS to be susceptible to resource exhaustion attacks. The research focuses on two distinct problems for the NIDS: missing alerts due to packet loss as a result of NIDS performance limitations; and the huge volumes of generated alerts by the NIDS overwhelming the security analyst which makes event observation tedious.udA methodology for analysing alerts using a proposed framework for alert correlation has been presented to provide the security operator with a global view of the security perspective. Missed alerts are recovered implicitly using a contextual technique to detect multi-stage attack scenarios. This is based on the assumption that the most serious intrusions consist of relevant steps that temporally ordered. The pre- and post- condition approach is used to identify the logical relations among low level alerts. The alerts are aggregated, verified using vulnerability modelling, and correlated to construct multi-stage attacks. A number of algorithms have been proposed in this research to support the functionality of our framework including: alert correlation, alert aggregation and graph reduction. These algorithms have been implemented in a tool called Multi-stage Attack Recognition System (MARS) consisting of a collection of integrated components. The system has been evaluated using a series of experiments and using different data sets i.e. publicly available datasets and data sets collected using real-life experiments. The results show that our approach can effectively detect multi-stage attacks. The false positive rates are reduced due to implementation of the vulnerability and target host information.
机译:连接到Internet的现代通信和网络系统的使用和复杂性的急剧增加,对安全管理提出了要求,以保护组织的敏感数据和资源免受恶意入侵。入侵者和黑客的恶意攻击通过几种复杂的技术来利用已部署系统中的缺陷和弱点,而这些常规技术无法通过传统措施来阻止,例如用户身份验证,访问控制和防火墙。因此,迫切需要自动检测和及时响应系统来通过监视网络流量和系统事件来检测异常活动。网络入侵检测系统(NIDS)和网络入侵防御系统(NIPS)是检查流量并诊断系统行为以提供改进的攻击保护的技术。 ud当前入侵检测系统(商业和开源)的实现缺乏可扩展性来支持网络速度的大幅度提高,新协议和服务的出现。多千兆网络已成为NIDS易于受到资源耗尽攻击的标准安装。研究针对NIDS的两个不同问题:由于NIDS性能限制而导致的数据包丢失导致警报丢失; NIDS产生的大量警报使安全分析人员不堪重负,这使事件观察变得乏味。 ud提出了一种使用提议的警报关联框架来分析警报的方法,可为安全操作员提供安全性观点的全局视图。使用上下文技术隐式恢复丢失的警报,以检测多阶段攻击情形。这是基于这样的假设,即最严重的入侵包括按时间顺序排列的相关步骤。前置和后置条件方法用于识别低级警报之间的逻辑关系。警报将被汇总,使用漏洞建模进行验证并进行关联以构造多阶段攻击。这项研究中已经提出了许多算法来支持我们框架的功能,包括:警报关联,警报聚合和图形缩减。这些算法已在称为多阶段攻击识别系统(MARS)的工具中实现,该工具由一组集成组件组成。该系统已通过一系列实验和使用不同的数据集进行了评估,即使用实际实验收集的公开数据集和数据集。结果表明,我们的方法可以有效地检测多阶段攻击。由于实施了漏洞和目标主机信息,误报率降低了。

著录项

  • 作者

    Alserhani Faeiz;

  • 作者单位
  • 年度 2011
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号