• DocumentCode
    589792
  • Title

    Real-time attack scenario detection via intrusion detection alert correlation

  • Author

    Zali, Z. ; Hashemi, Mohammed R. ; Saidi, Hossein

  • Author_Institution
    Electr. & Comput. Eng., Isfahan Univ. of Technol., Isfahan, Iran
  • fYear
    2012
  • fDate
    13-14 Sept. 2012
  • Firstpage
    95
  • Lastpage
    102
  • Abstract
    Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. The main purpose of this paper is to propose a new IDS alert correlation method to detect attack scenarios in real-time. The proposed method is based on causal approach due to the strength of causal methods in practice. Most of causal methods can be deployed offline but not in real-time due to time and memory limitations. In the proposed method the knowledge base of attack patterns is represented in a graph model called Causal Relations Graph. In offline, we construct some trees related to alerts probable correlations. In real-time for each received alert, we can find its correlations with previously received alerts by performing a search only in the corresponding tree. Thus processing time of each alert decreases significantly. In addition, the proposed method is immune to the deliberately slowed attacks. To verify the proposed method, it was implemented in C++ and we used DARPA2000 dataset to test it. Experimental results show the correctness of the proposed alert correlation and its efficiency with respect to the run time.
  • Keywords
    C++ language; computer network security; knowledge based systems; real-time systems; trees (mathematics); C++ implementation; DARPA 2000 dataset; IDS alert correlation method; attack patterns; causal approach; causal methods; causal relations graph; graph model; intrusion detection alert correlation; intrusion detection systems; knowledge base representation; real-time attack scenario detection; trees; Algorithm design and analysis; Correlation; IP networks; Knowledge based systems; Memory management; Real-time systems; Security; Alert; Alert Correlation; Attack; Attack Scenario; Graph; Intrusion; Intrusion Detection System;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
  • Conference_Location
    Tabriz
  • Print_ISBN
    978-1-4673-2387-1
  • Type

    conf

  • DOI
    10.1109/ISCISC.2012.6408197
  • Filename
    6408197