شماره ركورد كنفرانس :
766
عنوان مقاله :
Real Time Alert Correlation and Prediction using Bayesian Networks
عنوان به زبان ديگر :
Real Time Alert Correlation and Prediction using Bayesian Networks
پديدآورندگان :
Ahmadian Ramaki Ali نويسنده Iran - Mashhad - Ferdowsi University of Mashhad - Computer Engineering Department - Data and Communication Security Lab , Khosravi-Farma Masoud نويسنده Iran - Mashhad - Ferdowsi University of Mashhad - Computer Engineering Department - Data and Communication Security Lab , Ghaemi Bafghi Abbas نويسنده Iran - Mashhad - Ferdowsi University of Mashhad - Computer Engineering Department - Data and Communication Security Lab
تعداد صفحه :
6
كليدواژه :
alert , Correlation , Bayesian network , Intrusion Prediction , network security , Intrusion Detection
سال انتشار :
1394
عنوان كنفرانس :
12 دهمين كنفرانس بين المللي انجمن رمز ايران
زبان مدرك :
فارسی
چكيده لاتين :
Nowadays, to provide a picture of the current intrusive activities in the network, detection methods are important to tackle the probable risks of attackers’ malicious behaviors. Intrusion Detection Systems (IDSs), as detection solutions, are one of the main devices to record and analyze suspicious activities. A huge number of low-level alerts generated by IDSs clearly reflect the need for a novel alert correlation system to reduce alert redundancy, correlate security alerts, and discover multi-step attack scenarios. In this paper, we propose a novel alert correlation framework which processes the generated alerts in real time, correlate the alerts, construct the attack scenarios using the concept of Bayesian networks and forecasts the next goal of attackers using the creation of attack prediction rules. The proposed framework has two modes: on-line and offline. In the off-line mode, a Bayesian Attack Graph (BAG) is constructed using the concept of Bayesian networks. Then, in the on-line mode, the most probable next steps of the attacker are predicted. Experimental results show that the framework is efficient enough in detecting multi-step attack strategies without using any predefined knowledge. The results also show that the algorithm perfectly forecasts multi-step attacks before they can compromise the network.
شماره مدرك كنفرانس :
4490565
سال انتشار :
1394
از صفحه :
1
تا صفحه :
6
سال انتشار :
1394
لينک به اين مدرک :
بازگشت