期刊文献+

警报聚合分析与数据集测试的应用 被引量:1

The Implementation of Alert Aggregation and Dataset Testing
下载PDF
导出
摘要 入侵检测技术在网络安全防卫体系中变得越来越重要.在实际应用中,为了提高检测率通常采用基于多点的分布式数据采集或基于多引擎的协作式入侵检测,但是伴随而来的是警报数量和误报数量的海量增加,使管理员无法分辨警报的真伪并有效地管理入侵检测系统,从而降低了入侵检测系统的有效性和可用性.提出了一种基于密度的抗噪声时间聚类算法,将警报聚合和关联分析方法运用于分布式多引擎入侵检测场合来解决上述问题.实验采用数据集测试的方法对算法和原型系统进行了测试,并和相关研究工作进行了比较和分析.实验结果表明,系统对于分布式扫描有良好的检测效果,并在检测的实时性能上表现出优势. Intrusion detection systems are receiving considerable attention and serving as an indispensable fortification for shielding networks against attackers. To improve the effectiveness of intrusion detection systems, distributed schemes are developed and implemented in real networks. The distributed schemes are classified into two major principles on the basis of data collection and detection engines. Both of them generate a mass of alerts and false positives that flood the administrators and thus impair the effectiveness of IDS. A two-stage real time solution based on DBTCAN (density-based time clustering of application with noise) algorithm is presented for alert aggregation and correlation in distributed contexts. The effectiveness of the approach and prototype on the intrusion detection evaluation dataset is demonstrated, where attacks can be detected more accurately with a low rate of false alarms and more succinct and informative alerts can be provided for administrators with the redundant alarms greatly reduced. The comparative experiments and analysis show that the approach is effective in distributed probing detection and the system gives better results in real time detection.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第4期627-632,共6页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2001AA142020)
关键词 入侵检测 IDS 警报聚合 数据集 测试 intrusion detection IDS alert aggregation dataset testing
  • 相关文献

参考文献10

  • 1V.Paxson.Bro:A system for detecting network intruders in realtime.Computer Networks,1999,31(23-24):2435~2463 被引量:1
  • 2M.Roesch.Snort:Lightweight intrusion detection for networks.LISA'99,13th Systems Administration Conf.,Seattle,Washington,1999 被引量:1
  • 3M.V.Mahoney,P.K.Chan.Learning rules for anomaly detection of hostile network traffic.In:Proc.3rd IEEE Int'l Conf.Data Mining.Los Alamitos,CA,IEEE Computer Society Press,2003.601~604 被引量:1
  • 4M.Ester,H.P.Kriegel,J.Sander,et al.A density-based algorithm for discovering clusters in large spatial databases.In:Proc.1996 Int'l Conf.Knowledge Discovery and Data Mining.Portland:Oregon,1996.226~231 被引量:1
  • 5W.H.Joshua,P.L.Richard,J.F.David,et al.1999 DARPA intrusion detection system evaluation:Design and procedures.MIT Lincoln Laboratory,Tech.Rep.:TR1062,2001 被引量:1
  • 6R.P.Lippmann,J.W.Haines,D.J.Fried,et al.The 1999 DARPA oftline intrusion detection evaluation.Computer Networks,2000,34(4):579~595 被引量:1
  • 7K.Kendall.A database of computer attacks for the evaluation of intrusion detection system:[Master dissertation].Massachusetts:MIT,1999 被引量:1
  • 8P.A.Porras,M.W.Fong,A.Valdes.A mission-impact-based approach to INFOSEC alarm correlation.Recent Advances in Intrusion Detection,Zurich,Switzerland,2001 被引量:1
  • 9R.P.Goldman,W.Heimerdinger,S.A.Harp,et al.Information modeling for intrusion report aggregation.In:Proc.DARPA Information Survivability Conference and Exposition (DISCEX Ⅱ).Los Alamitos,CA:IEEE Computer Society Press,2001.329~342 被引量:1
  • 10H.Debar,A.Wespi.Aggregration and correlation of intrusiondetection alerts.Recent Advances in Intrusion Detection (RAID),Zurich,Switzerland,2001 被引量:1

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部