DocumentCode :
3299219
Title :
Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment
Author :
Long, Wen ; Xin, Yang ; Yang, Yixian
Author_Institution :
State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
fYear :
2009
fDate :
11-12 July 2009
Firstpage :
408
Lastpage :
411
Abstract :
With the growing deployment of host and network intrusion detection systems, managing alerts from these systems becomes critically important. A promising approach is to develop a cooperation module between several IDS to achieve alerts correlation and generate more global and synthetic alerts. Some approaches (e.g. TIAA) have developed an available solution to correlate intrusion alerts using prerequisites of intrusions, which constructs attack scenarios by correlating alerts on the basis of prerequisites and consequences of attacks. The biggest defect of these approaches lies in the complexity of the relation of consequences so that the correlation graphs maybe very huge and unreadable. The phenomenon occurs mainly because these approach correlation all alerts on an equal footing, which arenpsilat consider the influencing factors of different alerts on the same information system. We propose a model to achieve alert correlation which supplies information about the vulnerabilities. Similar to TIAA, we use a hyper-alert type to encode our knowledge about each type of attacks. Our approach is differing with TIAA on the definition of hyper-alert type and correlation measure. In addition, our proposal has a relational database implements parts and the corresponding tables are automatically generated from data sources. IDS and vulnerability scanner fill the database with events.
Keywords :
distributed processing; graph theory; relational databases; security of data; correlation graphs; distributed environment; information system; network intrusion detection systems; relational database; vulnerabilities analyzing model; Conference management; Engineering management; Environmental management; Humans; Information systems; Intrusion detection; Laboratories; Monitoring; Proposals; Relational databases; alert correlation; hyper-alert type; prerequisites and consequences; vulnerability tuple;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Services Science, Management and Engineering, 2009. SSME '09. IITA International Conference on
Conference_Location :
Zhangjiajie
Print_ISBN :
978-0-7695-3729-0
Type :
conf
DOI :
10.1109/SSME.2009.132
Filename :
5233261
Link To Document :
بازگشت