39th Annual IEEE Conference on Local Computer Networks 2014
DOI: 10.1109/lcn.2014.6925787
|View full text |Cite
|
Sign up to set email alerts
|

OutMet: A new metric for prioritising intrusion alerts using correlation and outlier analysis

Abstract: In a medium sized network, an Intrusion Detection System (IDS) could produce thousands of alerts a day many of which may be false positives. In the vast number of triggered intrusion alerts, identifying those to prioritise is highly challenging. Alert correlation and prioritisation are both viable analytical methods which are commonly used to understand and prioritise alerts. However, to the author's knowledge, very few dynamic prioritisation metrics exist. In this paper, a new prioritisation metric -OutMet, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…Numerous related works have investigated this approach and have shown it to achieve good results. The proposed solutions have been adopted by commercial products [5,34,35].…”
Section: Filtering-and Correlation-based Approachesmentioning
confidence: 99%
“…Numerous related works have investigated this approach and have shown it to achieve good results. The proposed solutions have been adopted by commercial products [5,34,35].…”
Section: Filtering-and Correlation-based Approachesmentioning
confidence: 99%
“…The likelihood that a certain incident ID is not present in any of the produced hyper alert, is the product of the probabilities of not being in each of the individual hyper alerts (Cf. (20)). Based on this, IMR is calculated as the expected rate at which an incident is not being found by the described "oracle analyst" (Cf.…”
Section: Metricsmentioning
confidence: 99%
“…It seems a more prudent approach to let IDSs be overly sensitive, and then address the filtering and correlation problems in a pre-processing step. This is supported by such approaches achieving good results [6], [7], [8], [13], [14], [15], [16], [17], [18], [19], [20], and by existence of commercial products such as Cisco Security MARS and FireEye.…”
Section: Introductionmentioning
confidence: 99%
“…Our hypothesis is that a set of correlated alerts should be prioritised if it represents anomalous network behaviour at a given time. The prioritisation metric is based on our previous work (Shittu et al, 2014). In our new work we have improved the correlation phase.…”
Section: Contributionsmentioning
confidence: 99%