Multi-paradigm frameworks for scalable intrusion detection
نویسندگان
چکیده
correlation between the clustered alerts' network activity profiles. Using this technique, alerts from multiple IDS, IPS and ADS sensors can be correlated without the need of normalization, the use of an alert ontology or expert rules. Additionally, our approach does not temporally constrain the correlation process, allowing for long-term trend analysis and knowledge discovery. Although our current focus is on network datasets, our approach can be generalized to support data from host-based tools. To evaluate our technique, we implemented a prototype offline correlation system and generated Snort alert correlation results from non-overlapping, independent one-month and six-month datasets. Security analysts at Los Alamos National Laboratory (LANL) evaluated the one-month dataset. The domain experts were asked to compare the correlation of our technique to that of a control group, which performed correlation by grouping alerts by fields in the alert schema. In our test, the experts preferred our technique to the control group, showing that our generalized correlation technique produces results that are better than an algorithm that groups alerts using the alert schema, as typically done in practice. Additionally, the experts showed a preference towards correlation results utilizing network log data in addition to the information in the alert data set. This shows that adding suitable log data yields improved results, an important factor in expanding our prototype in future study to incorporate additional alert databases for correlation. Lastly, we explore the average entropy of alert clusters in relation to the number of clusters generated by the clustering algorithm and use this metric to tune our results. 5.2. Alert Profile Construction To begin the alert correlation process, related network log records, referred to as events, are gathered for each alert in the database. These events are used to construct feature vectors in the second phase of the process. Defining how events are related to a particular alert is challenging and is dependent on domain knowledge and available datasets. This is a critical aspect of the design and implementation of the system. For our prototype, events are gathered from three datasets: Snort alerts, TippingPoint block logs and network connection records from proprietary LANL software known as NetFIead. These three datasets are related in that they monitor network traffic and do so in
منابع مشابه
MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملImplementation of Multiple Classifier System on MapReduce Framework for Intrusion Detection
Since the data volume from various facilities keeps growing rapidly in recent years, ”big data” processing frameworks such as Hadoop have been developed as a scalable architecture to process large amount of data in cloud computing environment. We focus on intrusion detection problems which require large amount of data to be processed in order to detect malicious attacks. In this paper we discus...
متن کاملTowards an Integrated Intrusion Detection Monitoring in High Speed Networks
Problem statement: Security Management has become a critical aspect for large scale distributed systems. Particularly, recent Distributed Intrusion Detection Systems (DIDS) schemes in High Speed Networks (HSN) have raised new serious management problems and challenges. Increasing the effectiveness of IDS monitoring is primordial to satisfy the restrictive constraints in such large multi-domains...
متن کاملAgent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconnected from the recent advances in the multi-agent research, most notably the field of trust modeling. Our contribution reviews recent implementations of IDS systems and presents them from an agent research perspective. ...
متن کاملNetwork security management with intelligent agents
Multi-Agent Systems technology can be useful for efficiently designing and maintaining secure networks. Indeed, networks evolve at a rapid pace in terms of the number and type of components and user access queries as well as intrusion possibilities. Features such as autonomy, adaptability and flexibility of the “intelligent” agent paradigm allow managing network evolution in a controlled way. T...
متن کاملThe All-Seeing Eye: A Massive-Multi-Sensor Zero-Configuration Intrusion Detection System for Web Applications
Timing attacks are a challenge for current intrusion detection solutions. Timing attacks are dangerous for web applications because they may leak information about side channel vulnerabilities. This paper presents a massive-multi-sensor zeroconfiguration Intrusion Detection System that is especially good at detecting timing attacks. Unlike current solutions, the proposed Intrusion Detection Sys...
متن کامل