【24h】

Event-Based Alert Correlation System to Detect SQLI Activities

机译:基于事件的警报关联系统,用于检测SQLI活动

获取原文
获取外文期刊封面目录资料

摘要

Alerts correlation techniques have been widely used to provide intelligent and stateful detection methodologies. This is to understand attack steps and predict the expected sequence of events. However, most of the proposed systems are based on rule -- based mechanisms which are tedious and error prone. Other methods are based on statistical modeling, these are unable to identify causal relationships between the events. In this paper, we have identified the limitations of the current techniques and propose a model for alert correlation that overcomes the shortcomings. An improved "require/provide" model is presented which established a cooperation between statistical and knowledge-based model, to achieve higher detection rate with the minimal false positives. A knowledge-based model with vulnerability and extensional conditions provide manageable and meaningful attack graphs. The proposed model has been implemented in real-time and has successfully generated security events on establishing a correlation between attack signatures. The system has been evaluated to detect one of the most serious multi-stage attacks in cyber crime -- SQLIA (SQL Injection Attack). Typical SQLIA steps are analyzed within the realm of simulated malicious activities normally used by cyber criminals. The system has efficiently established a correlation in attack behaviors and has generated an attack map. The map can be used to discretely analyze the correlated attack activities which in other case may go undetected thus facilitating the multi-stage attack recognition process.
机译:警报关联技术已被广泛用于提供智能和状态检测方法。这是为了了解攻击步骤并预测事件的预期顺序。但是,大多数提议的系统都是基于规则的机制,这些机制既乏味又容易出错。其他方法基于统计建模,这些方法无法识别事件之间的因果关系。在本文中,我们已经确定了当前技术的局限性,并提出了一种克服上述缺点的警报关联模型。提出了一种改进的“需要/提供”模型,该模型在统计模型和基于知识的模型之间建立了合作关系,从而以最小的误报率实现了更高的检测率。具有漏洞和扩展条件的基于知识的模型提供了可管理的有意义的攻击图。所提出的模型已实时实施,并且在建立攻击特征之间的相关性时已成功生成了安全事件。该系统已经过评估,可以检测网络犯罪中最严重的多阶段攻击之一-SQLIA(SQL注入攻击)。在网络犯罪分子通常使用的模拟恶意活动领域内分析了典型的SQLIA步骤。该系统有效地建立了攻击行为的相关性,并生成了攻击图。该图可用于离散地分析相关的攻击活动,而在其他情况下,这些攻击活动可能未被检测到,从而促进了多阶段攻击识别过程。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号