مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

1,063
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

232
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

REAL-TIME INTRUSION DETECTION ALERT CORRELATION AND ATTACK SCENARIO EXTRACTION BASED ON THE PREREQUISITE-CONSEQUENCE APPROACH

Pages

  125-136

Abstract

 Alert correlation systems attempt to discover the relations among ALERTs produced by one or more INTRUSION detection systems to determine the ATTACK scenarios and their main motivations. In this paper a new IDS ALERT correlation method is proposed that can be used to detect ATTACK scenarios in real-time.The proposed method is based on a causal approach due to the strength of causal methods in practice. To provide a picture of the current intrusive activity on the network, we need a real-time ALERT correlation. Most causal methods can be deployed offline but not in real-time due to time and memory limitations. In the proposed method, the knowledge base of the ATTACK patterns is represented in a GRAPH model called the Causal Relations GRAPH. In the offline mode, we construct Queue trees related to ALERTs' probable correlations. In the real-time mode, for each received ALERT, we can find its correlations with previously received ALERTs by performing a search only in the corresponding tree.Therefore, the processing time of each ALERT decreases significantly. In addition, the proposed method is immune to deliberately slowed ATTACKs. To verify the proposed method, it was implemented and tested using DARPA2000 dataset.Experimental results show the correctness of the proposed ALERT correlation and its efficiency with respect to the running time.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    ZALI, ZEINAB, HASHEMI, MASSOUD REZA, & SAIDI, HOSSEIN. (2012). REAL-TIME INTRUSION DETECTION ALERT CORRELATION AND ATTACK SCENARIO EXTRACTION BASED ON THE PREREQUISITE-CONSEQUENCE APPROACH. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 4(2), 125-136. SID. https://sid.ir/paper/241828/en

    Vancouver: Copy

    ZALI ZEINAB, HASHEMI MASSOUD REZA, SAIDI HOSSEIN. REAL-TIME INTRUSION DETECTION ALERT CORRELATION AND ATTACK SCENARIO EXTRACTION BASED ON THE PREREQUISITE-CONSEQUENCE APPROACH. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY[Internet]. 2012;4(2):125-136. Available from: https://sid.ir/paper/241828/en

    IEEE: Copy

    ZEINAB ZALI, MASSOUD REZA HASHEMI, and HOSSEIN SAIDI, “REAL-TIME INTRUSION DETECTION ALERT CORRELATION AND ATTACK SCENARIO EXTRACTION BASED ON THE PREREQUISITE-CONSEQUENCE APPROACH,” THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 4, no. 2, pp. 125–136, 2012, [Online]. Available: https://sid.ir/paper/241828/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button