Cooperative Anomaly and Intrusion Detection for Alert Correlation in Networked Computing Systems
نویسندگان
چکیده
Network-centric computing systems manifest as Grids, clusters, Intranets, LANs, or P2P networks, etc. These distributed systems are subject to security breaches in an open network environment. Conventional intrusion detection systems (IDS) use the misuse model at the packet level. An anomaly detection system (ADS) follows a normal-use model at Internet connection level. We integrate these two alert systems into a Cooperative Anomaly and Intrusion Detection System (CAIDS). This integrated system detects not only known attacks but also unknown anomalies. The system integration is enabled by Internet episode datamining, anomaly classification, alert correlation, and automated signature generation. We have tested the CAIDS performance at USC with an Internet trace of 23.35 millions of traffic packets, intermixed with 200 attacks from the Lincoln Lab IDS dataset. We achieved a combined detection rate up to 75% at a false alarm rate lower than 5%. These results are sharply improved from 38% in using the network IDS Snort and from 50% in using the ADS alone. Our system detects many novel attacks hidden in telnet, http, ftp, smtp, Email, pop3, and authentication services. The CAIDS offers correlated alerts to intrusions on distributed hosts or anomalies with disrupted connectivity in the component networks.
منابع مشابه
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملReal-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach
Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...
متن کاملTitle : Alert Correlation in Collaborative Intelligent Intrusion
As complete prevention of computer attacks is not possible, intrusion detection systems (IDSs) play a very important role in minimizing the damage caused by different computer attacks. There are two intrusion detection methods: namely misuseand anomaly-based. A collaborative intelligent intrusion detection system (CIIDS) is proposed to include both methods, since it is concluded from recent res...
متن کاملAsynchronous Alert Correlation in Multi-agent Intrusion Detection Systems
This paper presents conceptual model, architecture and software prototype of a multi-agent intrusion detection system (IDS) operating on the basis of heterogeneous alert correlation. The latter term denotes IDS provided with a structure of anomaly detection–like classifiers designed for detection of intrusions in cooperative mode. An idea is to use a structure of classifiers operating on the ba...
متن کاملMoving dispersion method for statistical anomaly detection in intrusion detection systems
A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...
متن کامل