首页> 外文会议>2011 IEEE International System Conference >Automatic attack scenario discovering based on a new alert correlation method
【24h】

Automatic attack scenario discovering based on a new alert correlation method

机译:基于新的警报关联方法的自动攻击场景发现

获取原文
获取外文期刊封面目录资料

摘要

In recent years, many approaches for correlating alerts and discovering attack scenarios have been proposed. However, most of them have difficulties such as high dependency to predefined correlation rule definitions and domain knowledge, huge volume of computing workload in some cases and limited capability in discovering new attack scenarios. Therefore, in this paper, we proposed a new alert correlation method to automatically extract multi-step attack scenarios. This method works based on a multi-phase process which acts on the IDS generated alerts. In normalization phase, alerts are turned to the form that can be easily processed by the proposed system. In alert Winnowing phase, for each alert is determined that it belongs to which alert sequence or attack scenario. After determining alerts scenarios, for each scenario its sub scenarios and Meta alerts are extracted. Finally, from the produced Meta alerts, the multi-step attack graph is constructed for each attack scenario. We evaluate our approach using DARPA 2000 data sets. Our experiments show our approach can effectively construct multi-step attack scenarios and give high level view of intruder intentions.
机译:近年来,已经提出了许多用于将警报关联和发现攻击场景的方法。然而,它们中的大多数具有诸如对预定义的关联规则定义和领域知识的高度依赖性,在某些情况下的大量计算工作量以及发现新的攻击情形的能力有限的困难。因此,在本文中,我们提出了一种新的警报关联方法来自动提取多步攻击情景。此方法基于对IDS生成的警报起作用的多阶段过程来工作。在规范化阶段,警报将转换为建议的系统可以轻松处理的表单。在警报Winnowing阶段,对于每个警报,确定它属于哪个警报序列或攻击方案。确定警报方案后,针对每个方案提取其子方案和元警报。最后,根据产生的元警报,针对每个攻击场景构建多步攻击图。我们使用DARPA 2000数据集评估我们的方法。我们的实验表明,我们的方法可以有效地构建多步攻击方案,并从更高角度了解入侵者的意图。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号