期刊文献+

基于不确定性知识发现的入侵报警关联方法 被引量:1

Intrusion alert correlation method based on uncertain knowledge discovery
下载PDF
导出
摘要 针对入侵检测系统报警信息量大、琐碎和分散的问题,提出了一种基于不确定性知识发现的入侵报警关联方法。该方法的知识发现部分采用提出的不确定性序列模式发现算法CWINEPI对报警数据进行序列模式发现,并转化成入侵报警精简规则;再对入侵报警序列模式进行关联以获取攻击模式,并转化为入侵场景重建规则。入侵报警关联部分使用报警关联引擎,对多个入侵检测系统上报的入侵报警进行关联。通过DARPA2000的报警数据验证了知识发现部分的良好性能,测试环境中的入侵报警的关联结果表明了该方法是高效、可行的。 To solve the problems of large quantity,trivialness and dispersion of intrusion alerts in intrusion detection systems,an intrusion alert correlation method based on uncertain knowledge discovery was proposed.In the knowledge discovery part,a new discovery algorithm of uncertain sequence patterns,named CWINEPI,was used to discover the sequence patterns of intrusion alerts and translated them into intrusion alerts condensed rules.The attack patterns were obtained with correlating sequence patterns,and convert...
出处 《计算机应用》 CSCD 北大核心 2009年第3期808-812,共5页 journal of Computer Applications
基金 国防基础科研项目(A3220061163)
关键词 入侵检测 知识发现 报警关联 intrusion detection knowledge discovery intrusion alert correlation
  • 相关文献

参考文献1

二级参考文献15

  • 1D E Denning. An intrusion detection model. IEEE Trans on Software Engineering, 1987, 13(2): 222~232
  • 2Internet Security Systems Corporation. Realsecure network sensor and gigabit network sensor frequently asked questions. http://documents.iss.net/literature/RealSecure/rsn_faq.pdf, 2003-03-01
  • 3Martin Roesch, Chris Green. Snort users manual release 2.0. http://www.snort.org/docs/snort_manual.pdf, 2003-04-08
  • 4H S Javits, A Valdes. The NIDES statistical component: Description and justification. SRI International, Computer Science Laboratory, Tech Rep: SRI-93-01, 1993
  • 5Richard Lippmann, Seth Webster, Douglas Stetson. The effect of identifying vulnerabilities and pathing software on the utility of network intrusion detection. The 5th Int'l Symp on Recent Advances in Intrusion Detection, Zurich, Switzerland, 2002
  • 6Alfonso Valdes, Keith Skinner. Probabilistic Alert Correlation. The 4th Int'l Symp on Recent Advance in Intrusion Detection, UC Davis, 2001
  • 7Herve Debar, Andreas Wespi. Aggregation and correlation of intrusion-detection alerts. The 4th Int'l Symp on Recent Advance in Intrusion Etection, UC Davis, 2001
  • 8Peng Ning, Yun Cui, Douglas S Reeves. Analyzing intensive intrusion alerts via correlation. The 5th Int'l Symp on Recent Advance in Intrusion Detection, Zurich, Switzerland, 2002
  • 9Frédéric Cuppens, Alexandre Miège. Alert correlation in a cooperative intrusion detection framework. 2002 IEEE Symp on Security and Privacy, Oakland, California, 2002
  • 10Stefanos Manganaris, Marvin Christensen, Dan Zerkle, et al. A data mining analysis of RTID alarms. Computer Networks, 2000, 34(4): 571~577

共引文献5

同被引文献10

  • 1Axelsson S. The base-rate fallacy and its implications for the intrusion detection[C] //Proc of the 6th ACM Conference on Computer and Communications Security. 1999:1-7.
  • 2Valdes A, Skinner K. Probabilistic alert correlation[C] //Proc of the 4th International Symposium on Recent Advances in Intrusion Detection. 2001:54-68.
  • 3Julisch K. Clustering intrusion detection alarms to support root cause analysis[J] . ACM Trans on Information and System Security, 2002, 2(3):111-138.
  • 4Ning Peng, Cui Yun, Reeves D S. Constructing attack scenarios through correlation of intrusion alerts[C] //Proc of the 9th ACM Conference on Computer and Communications Security. 2002:245-254.
  • 5Ning Peng, Cui Yun, Reeves D S, et al. Tools and techniques for analyzing intrusion alerts[J] . ACM Trans on Information and System Security, 2004, 7(2):274-318.
  • 6Al-Mamory S O, Zhang Hongli. IDS alerts correlation using grammar-based approach[J] . Journal of Computer Virology, 2009, 5(4):271-282.
  • 7Lee W, Qin Xinzhou. Statistical causality analysis of INFOSEC alert data[C] //Proc of the 6th International Symposium on Recent Advances in Intrusion Detection. 2003:73-93.
  • 8郭帆,叶继华,余敏.一种分布式IDS报警聚合模型的设计与实现[J].计算机应用研究,2009,26(1):325-329. 被引量:3
  • 9廖年冬,熊兵,胡琦.增量挖掘实时报警关联研究[J].计算机工程与应用,2012,48(4):25-28. 被引量:2
  • 10吕慧颖,彭武,王瑞梅,王洁.基于时空关联分析的网络实时威胁识别与评估[J].计算机研究与发展,2014,51(5):1039-1049. 被引量:31

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部