DocumentCode :
1823769
Title :
Finding the Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets
Author :
Treinen, James J. ; Thurimella, Ramakrishna
Author_Institution :
Colorado Res. Inst. for Security & Privacy, Univ. of Denver, Denver, CO, USA
Volume :
2
fYear :
2009
fDate :
29-31 Aug. 2009
Firstpage :
237
Lastpage :
244
Abstract :
Managed security service providers (MSSPs) must manage and monitor thousands of intrusion detection sensors. The sensors often vary by manufacturer and software version, making the problem of creating generalized tools to separate true attacks from false positives particularly difficult. Often times it is useful from an operations perspective to know if a particular sensor is acting out of character. We propose a solution to this problem using anomaly detection techniques over the set of alarms produced by the sensors. Similar to the manner in which an anomaly based sensor detects deviations from normal user or system behavior, we establish the baseline behavior of a sensor and detect deviations from this baseline. We show that departures from this profile by a sensor have a high probability of being artifacts of genuine attacks. We evaluate a set of time-based Markovian heuristics against a simple compression algorithm and show that we are able to detect the existence of all attacks which were manually identified by security personnel, drastically reduce the number of false positives, and identify attacks which were overlooked during manual evaluation.
Keywords :
data compression; hidden Markov models; security of data; anomaly detection techniques; compression algorithm; deviation detection; false alarm suppression; generalized tools; hidden Markov model; intrusion detection data sets; intrusion detection sensors; managed security service providers; software version; time-based Markovian heuristics; Conference management; Data engineering; Data privacy; Data security; Databases; Hidden Markov models; Intrusion detection; Monitoring; Needles; Sensor systems; anomaly detection; hidden markov model; intrusion detection; markov chain;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Science and Engineering, 2009. CSE '09. International Conference on
Conference_Location :
Vancouver, BC
Print_ISBN :
978-1-4244-5334-4
Electronic_ISBN :
978-0-7695-3823-5
Type :
conf
DOI :
10.1109/CSE.2009.149
Filename :
5284168
Link To Document :
بازگشت