Real-Time Alert Correlation with Type Graphs

04/23/2010
by   Gianni Tedesco, et al.
0

The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in an understandable way. Several algorithms exist for this purpose which use attack graphs to model the ways in which attacks can be combined. These algorithms can be classified in to two broad categories namely scenario-graph approaches, which create an attack model starting from a vulnerability assessment and type-graph approaches which rely on an abstract model of the relations between attack types. Some research in to improving the efficiency of type-graph correlation has been carried out but this research has ignored the hypothesizing of missing alerts. Our work is to present a novel type-graph algorithm which unifies correlation and hypothesizing in to a single operation. Our experimental results indicate that the approach is extremely efficient in the face of intensive alerts and produces compact output graphs comparable to other techniques.

READ FULL TEXT
research
10/16/2021

An Effective Attack Scenario Construction Model based on Attack Steps and Stages Identification

A Network Intrusion Detection System (NIDS) is a network security techno...
research
08/09/2023

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance

Provenance graphs are structured audit logs that describe the history of...
research
05/16/2019

Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs

An Intrusion Detection System (IDS) to secure computer networks reports ...
research
12/17/2020

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

In this paper, we present a study that proposes a three-stage classifier...
research
08/10/2020

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Attack graphs are one of the main techniques used to automate the risk a...
research
03/18/2021

Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs

A vulnerability scan combined with information about a computer network ...
research
11/02/2018

Alert Correlation Algorithms: A Survey and Taxonomy

Alert correlation is a system which receives alerts from heterogeneous I...

Please sign up or login with your details

Forgot password? Click here to reset