首页> 外文会议>Computer Security Applications Conference, 2009. ACSAC '09 >An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
【24h】

An Empirical Approach to Modeling Uncertainty in Intrusion Analysis

机译:入侵分析不确定性建模的经验方法

获取原文

摘要

Uncertainty is an innate feature of intrusion analysis due to the limited views provided by system monitoring tools, intrusion detection systems (IDS), and various types of logs. Attackers are essentially invisible in cyber space and monitoring tools can only observe the symptoms or effects of malicious activities. When mingled with similar effects from normal or non-malicious activities they lead intrusion analysis to conclusions of varying confidence and high false positiveegative rates. This paper presents an empirical approach to the problem of uncertainty where the inferred security implications of low-level observations are captured in a simple logical language augmented with certainty tags. We have designed an automated reasoning process that enables us to combine multiple sources of system monitoring data and extract highly-confident attack traces from the numerous possible interpretations of low-level observations. We have developed our model empirically: the starting point was a true intrusion that happened on a campus network that we studied to capture the essence of the human reasoning process that led to conclusions about the attack. We then used a Datalog-like language to encode the model and a Prolog system to carry out the reasoning process. Our model and reasoning system reached the same conclusions as the human administrator on the question of which machines were certainly compromised. We then automatically generated the reasoning model needed for handling Snort alerts from the natural-language descriptions in the Snort rule repository, and developed a Snort add-on to analyze Snort alerts. Keeping the reasoning model unchanged, we applied our reasoning system to two third-party data sets and one production network. Our results showed that the reasoning model is effective on these data sets as well. We believe such an empirical approach has the potential of codifying the seemingly ad-hoc human reasoning of uncertain events, and can yield useful to-nols for automated intrusion analysis.
机译:由于系统监视工具,入侵检测系统(IDS)和各种类型的日志所提供的视图有限,不确定性是入侵分析的固有特征。攻击者在网络空间中基本上是看不见的,监视工具只能观察到恶意活动的症状或影响。当与正常或非恶意活动产生的类似影响混合在一起时,它们会导致入侵分析得出不同的置信度和较高的假阳性/阴性率结论。本文提出了一种不确定性问题的经验方法,该方法以简单的逻辑语言(带有确定性标签)捕获了低层观察的推断安全隐患。我们设计了一个自动推理过程,使我们能够组合多个系统监视数据源,并从对低层观测的多种可能解释中提取高度可信的攻击跟踪。我们凭经验开发了模型:起点是校园网络中发生的真正入侵,我们研究该网络是为了捕捉人类推理过程的本质,从而得出有关攻击的结论。然后,我们使用类似于Datalog的语言对模型进行编码,并使用Prolog系统执行推理过程。我们的模型和推理系统得出的结论与人工管理员在肯定损坏了哪些机器的问题上得出的结论相同。然后,我们从Snort规则存储库中的自然语言描述中自动生成处理Snort警报所需的推理模型,并开发了一个Snort插件来分析Snort警报。在保持推理模型不变的情况下,我们将推理系统应用于两个第三方数据集和一个生产网络。我们的结果表明,推理模型对这些数据集也有效。我们认为,这种经验方法具有将人类似乎不确定事件的即席推理进行整理的潜力,并且可以为自动入侵分析提供有用的提示。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号