• DocumentCode
    2940211
  • Title

    Alert Correlation through Results Tracing back to Reasons

  • Author

    Ping, Yi ; Hongkai, Xing ; Yue, Wu ; Jiwen, Cai

  • Author_Institution
    Sch. of Inf. Security Eng., Shanghai Jiao Tong Univ., Shanghai
  • Volume
    3
  • fYear
    2009
  • fDate
    6-8 Jan. 2009
  • Firstpage
    465
  • Lastpage
    469
  • Abstract
    IDS may result in many intrusion alerts. A general approach for solving this problem is to do some correlation analysis with these alerts and build attack scenario. Author presents a method for alert correlation through results tracing back to reasons. According to hacker attacks linked to a certain sequence characteristics, we correlate the alerts through results tracing back to reasons and gain the correlated alerts. This method can found internal relations of invasion, to accurately identify intrusion targets. Through succeed attacks to match the previous attacks, we can greatly reduce the volume of data, and improve speed and efficiency for correlation analysis.
  • Keywords
    correlation methods; security of data; alert correlation; correlation analysis; intrusion alerts; intrusion detection system; results tracing back to reasons; Bayesian methods; Data security; Degradation; Information security; Intrusion detection; Mobile communication; Mobile computing; Performance analysis; Target tracking; Telecommunication traffic; alert correlation; intrusion detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Mobile Computing, 2009. CMC '09. WRI International Conference on
  • Conference_Location
    Yunnan
  • Print_ISBN
    978-0-7695-3501-2
  • Type

    conf

  • DOI
    10.1109/CMC.2009.327
  • Filename
    4797297