Intrusion alert prioritisation and attack detection using post-correlation analysis

Computers & Security - Tập 50 - Trang 1-15 - 2015
Riyanat Shittu1, Alex Healing2, Robert Ghanea-Hercock2, Robin Bloomfield1, Muttukrishnan Rajarajan1
1School of Engineering and Mathematical Science, City University London, Northampton Square EC1V 0HB, UK
2Security Futures Practice, Research & Innovation, British Telecom, Ipswich IP5 3RE, UK

Tài liệu tham khảo

Aggarwal, 2010, On clustering graph streams, 478 Ahmadinejad SH, and Jalili S. Alert correlation using correlation probability estimation and time windows. Computer Technology and Development, 2009. ICCTD'09. International Conference on. Vol. 2. IEEE; 2009. AlienVault, 2013 Alireza Sadighian, 2013 Alsubhi, 2012, FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems, Int J Netw Manag, 22, 263, 10.1002/nem.804 Alsubhi, 2008, Alert prioritization in intrusion detection systems, 33 Benferhat, 2013, An intrusion detection and alert correlation approach based on revising probabilistic classifiers using expert knowledge, Appl Intell, 38, 520, 10.1007/s10489-012-0383-7 Breunig, 2000, LOF: identifying density-based local outliers, 1 Cédric Michel, 2001, 353 Chen, 2014, Characterization of computer network events through simultaneous feature selection and clustering of intrusion alerts, 912107 Cheung, 2003, Modeling multistep cyber attacks for scenario recognition, 284 Cuppens, 2000, LAMBDA: a language to model a database for detection of attacks, 197 Dain, 2001, Fusing a heterogeneous alert stream into scenarios, 1 Debar, 2001, Aggregation and correlation of intrusion-detection alerts, 85 Ester, 1996, A density-based algorithm for discovering clusters in large spatial databases with noise Hofmann, 2011, Online intrusion alert aggregation with generative data stream modeling, IEEE Trans Dependable Secure Comput, 8, 282, 10.1109/TDSC.2009.36 IBM Corporation, 2013 Khan, 2010, Towards proximity pattern mining in large graphs, 867 Lagzian, 2012, Frequent item set mining-based alert correlation for extracting multi-stage attack scenarios, 1010 Marchetti, 2011, Identification of correlated network intrusion alerts Pseudo-Bayesian, 15 Ning, 2001 Ning, 2003, Learning attack strategies from intrusion alerts, 200 Noel, 2007, Attack graphs for sensor placement, alert prioritization, and attack response, 1 Patel, 2009 Pokrajac, 2007, Incremental local outlier detection for data streams Porras, 2002, A mission-impact-based approach to INFOSEC alarm correlation, 95 Qin, 2005 Ren, 2010, An online adaptive approach to alert correlation, 153 Sadoddin, 2009, An incremental frequent structure mining framework for real-time alert correlation, Comput Secur, 28, 153, 10.1016/j.cose.2008.11.010 Salah, 2013, A model-based survey of alert correlation techniques, Comput Netw, 57, 1289, 10.1016/j.comnet.2012.10.022 Shapiro, 1981, Structural descriptions and inexact matching, IEEE Trans Pattern Anal Mach Intell, 3, 504, 10.1109/TPAMI.1981.4767144 Shittu, 2014, OutMet: a new metric for prioritising intrusion alerts using correlation and outlier analysis Steven Eckmann, 2002, STATL: an attack language for state-based intrusion detection, J Comput Secur, 10, 71, 10.3233/JCS-2002-101-204 Sundaramurthy, 2011, Practical IDS alert correlation in the face of dynamic threats Tekhov, 2009 Valdes, 2001, Probabilistic alert correlation, 54 Verizon, 2013 Winter, 2012, System security assessment using a cyber range Yan X, and Han J. gSpan: Graph-based substructure pattern mining. ICDM 2003. Proceedings 2002 of IEEE International Conference on Data Mining. IEEE; 2002 Zali, 2013 Zomlot, 2011, Prioritizing intrusion analysis using Dempster–Shafer theory, 59