Proceedings of the 9th ACM Conference on Computer and Communications Security 2002
DOI: 10.1145/586110.586144
|View full text |Cite
|
Sign up to set email alerts
|

Constructing attack scenarios through correlation of intrusion alerts

Abstract: Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections between them. In situations where there are intensive attacks, not only will actual alerts be mixed with false alerts, but the amount of alerts will also become unmanageable. As a result, it is difficult for human users or intrusion response systems to understand the alerts and take appropriate actions. This paper presents a practical technique to addre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
191
0
3

Year Published

2005
2005
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 308 publications
(194 citation statements)
references
References 19 publications
0
191
0
3
Order By: Relevance
“…The general approach for correlating aspects of behaviour observed by various sensors is based on ideas presented by Strayer et al [27], Oliner et al [17] and Flaglien et al [4], which extend older proposals made by Cuppens & Miège [3] and Ning et al [16] for correlation of alerts in IDS systems. Using these or similar concepts, several authors have proposed botnet detection systems that correlate alerts from several detection entities.…”
Section: Collaborative Botnet Detectionmentioning
confidence: 99%
“…The general approach for correlating aspects of behaviour observed by various sensors is based on ideas presented by Strayer et al [27], Oliner et al [17] and Flaglien et al [4], which extend older proposals made by Cuppens & Miège [3] and Ning et al [16] for correlation of alerts in IDS systems. Using these or similar concepts, several authors have proposed botnet detection systems that correlate alerts from several detection entities.…”
Section: Collaborative Botnet Detectionmentioning
confidence: 99%
“…Schemes in this area can be classified under two basic groups: schemes that require patterns of actual attacks and/or alert interdependencies, and schemes that do not. Members of the first group include [11], [12], and [13]. Our proposed framework, can be classified as part of the first group.…”
Section: Related Workmentioning
confidence: 99%
“…In [11], the authors present a formal framework for alert correlation that constructs attack graphs by correlating individual alerts on the basis of the prerequisites and consequences manually associated to each alert. [12] presents techniques to learn attack strategies from correlated attack graphs.…”
Section: Related Workmentioning
confidence: 99%
“…This work outlines a semi-automatic approach for reducing false positives in alarms by identifying the root causes with clustering of alerts by abstraction and then eliminating the root causes to reduce alarm overload. Ning et al proposes an alert correlation model based on prerequisites and consequences of intrusion [8]. With knowledge of prerequisites and consequences, the correlation model can correlate related alerts by matching the consequences of previous alerts with prerequisites of later ones and then hyper alert correlation graphs are used to represent the alerts.…”
Section: Related Workmentioning
confidence: 99%
“…Fig. 2 is an FCM that models the scenario described above for the DDoS attack using cause and effect types of events (the EEvents shown here are similar to the consequences of hyper alert types as in [8]). The FCM in this figure denotes that an IPSweep alert in the sensor report will generate an IPSweep CEvent, from which HostExits EEvent can be inferred.…”
Section: − Effect Events (Eevent)mentioning
confidence: 99%