期刊文献+

基于自扩展时间窗的告警多级聚合与关联方法 被引量:5

Multistage Aggregation and Correlation for Network Alerts Based on Self-extending Time Windows
下载PDF
导出
摘要 针对传统告警聚合与关联方法在合理性和准确性上的不足,提出了基于多级划分思想的告警聚合方法和基于马尔可夫链模型的告警关联方法。首先,使用入侵检测消息交换格式来描述网络告警,利用告警的时序接近关系进行时间窗口的自动扩展,将时间间隔小于预设阈值的告警划分到同一个时间窗内;进而,分别根据攻击类型、时间窗口、子网掩码、IP地址和端口信息依次划分告警,利用属性匹配方法进行子网级、主机级和服务级聚合,有效聚合攻击者利用同一路由器、傀儡主机或服务端口实施攻击而产生的相似告警;在此基础上,利用1阶马尔可夫链模型生成告警关联图,将攻击类型间的条件转移概率作为关联图的有向边,并利用告警的时序紧邻关系计算出攻击类型间的转移概率。实验中,利用入侵检测系统Snort的最严格模式处理DARPA2000流量数据,得到LLDo S1.0攻击场景所对应的入侵告警集合;利用本文方法对集合中的5类告警进行聚合和关联,通过参数寻优得到自扩展时间窗口最理想的间隔阈值,使得告警多级聚合结果能够有效精简告警,并与告警源IP和源端口的分布情况一致;通过比较告警关联结果与攻击场景的官方描述来计算告警关联的准确率。与传统方法进行对比,本文方法的告警关联准确率为97.94%,比传统方法提高了2.29%。 In order to deal with the shortages of traditional alerts aggregation and correlation methods on rationality and accuracy ,an aggregation method based on multistage division and a correlation method based on Markov chains model were presented. Firstly, the network alerts were described by intrusion detection message exchange format. If the time internals of alerts were shorter than the predefined threshold, the alerts would be divided into the same time window, and the time windows were extended automatically based on the temporal relationship of alerts. Then, the alerts were divided respectively according to the attributes of attack types, time windows, subnet masks, IP addresses and ports. To aggregate the similar alerts generated by the attacks which used the same router, host or port, the aggregation processes on the stages of subnet,host and service were respectively carried out based on attributes matching. On this basis, alerts correlation graph was generated by using one-step Markov chains model. In the graph,the directed edges represented the conditional transition probabilities between attack types, and the transition probabilities were calculated by the number of adjacent alerts. Finally, in the experiment, DARPA2000 traffic data was handled by the intrusion detection system Snort which was been configured as the most strict mode. After generating intrusion alerts set of LLDoS1.0 attack scenario, the above aggregation and correlation methods were con- ducted on the alerts of five types. The most ideal internal threshold of the self-extending time windows was further determined by param- eter optimization. In this way, the alerts were reduced by the multistage aggregation effectively, and the results of aggregation were in accordance with the distribution of alerts source IP and source ports. Moreover, the accuracy rate of alerts correlation was calculated by comparing the correlation results with the official description of LLDoS1.0. Experiments demonstrated that the accuracy rate of the proposed meth
出处 《工程科学与技术》 EI CAS CSCD 北大核心 2017年第1期206-212,共7页 Advanced Engineering Sciences
基金 国家自然科学基金资助项目(61672531) 湖北省自然科学基金资助项目(2015CFC867)
关键词 攻击检测 告警聚合 自扩展时间窗口 多级划分 马尔可夫模型 network security intrusion detection alerts aggregation time windows multistage division
  • 相关文献

参考文献7

二级参考文献68

  • 1穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 2郭山清,谢立,曾英佩.入侵检测在线规则生成模型[J].计算机学报,2006,29(9):1523-1532. 被引量:14
  • 3Ning P, Cui Y, Reeves D S. Analyzing Intensive Intrusion Alerts via Correlation [C] //Proceedings of International Symposium on Recent Advances in Intrusion Detection. Stevenage: Springer Verlang, 2002: 74-94. 被引量:1
  • 4Ning P, Cui Y, Reeves D S. Constructing Attack Scenarios through Correlation of Intrusion Alerts[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington: ACM, 2002: 245-254. 被引量:1
  • 5Ahmadinejad S H, Jalili S, Abadi M. A Hybrid Model for Correlating Alerts of Known and Unknown Attack Scenarios and Updating Attack Graphs[J]. Computer Networks, 2011, 55(9) : 2221-2240. 被引量:1
  • 6Ning P, Xu D, Healey C G, et al. Building Attack Scenarios through Integration of Complementary Alert Correlation Methods[C]//llth Annual Network and Distributed System Security Symposium. Stevenage: Springer, 2004: 97-111. 被引量:1
  • 7Ning P, Xu D. Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation[R/OL]. [2013-05- 19]. discovery, csc. ncsu. edu/pning/pubs/footcorldation, pdf. 被引量:1
  • 8Valeur F, Vigna G, Kruegel C, et al. A Comprehensive Approach to Intrusion Detection Alert Correlation[J]. IEEE Transactions on Dependable and Secure Computing, 2004, 1(3): 146-169. 被引量:1
  • 9Wang L, Liu A, Jajodia S. Using Attack Graphs for Correlating, Hypothesizing, and Predicting Intrusion Alerts[J]. Journal of Computer Communications, 2006, 29(15) : 2917-2933. 被引量:1
  • 10Zali Z, Hashemi M R, Saidi H. Real-Time Attack Scenario Detection via Intrusion Detection Alert Correlation[C]// Proceedings of the 9th International ISC Conference on Information Security and Cryptology. Piscataway: IEEE, 2012: 95-102. 被引量:1

共引文献52

同被引文献32

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部