DocumentCode :
2940211
Title :
Alert Correlation through Results Tracing back to Reasons
Author :
Ping, Yi ; Hongkai, Xing ; Yue, Wu ; Jiwen, Cai
Author_Institution :
Sch. of Inf. Security Eng., Shanghai Jiao Tong Univ., Shanghai
Volume :
3
fYear :
2009
fDate :
6-8 Jan. 2009
Firstpage :
465
Lastpage :
469
Abstract :
IDS may result in many intrusion alerts. A general approach for solving this problem is to do some correlation analysis with these alerts and build attack scenario. Author presents a method for alert correlation through results tracing back to reasons. According to hacker attacks linked to a certain sequence characteristics, we correlate the alerts through results tracing back to reasons and gain the correlated alerts. This method can found internal relations of invasion, to accurately identify intrusion targets. Through succeed attacks to match the previous attacks, we can greatly reduce the volume of data, and improve speed and efficiency for correlation analysis.
Keywords :
correlation methods; security of data; alert correlation; correlation analysis; intrusion alerts; intrusion detection system; results tracing back to reasons; Bayesian methods; Data security; Degradation; Information security; Intrusion detection; Mobile communication; Mobile computing; Performance analysis; Target tracking; Telecommunication traffic; alert correlation; intrusion detection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications and Mobile Computing, 2009. CMC '09. WRI International Conference on
Conference_Location :
Yunnan
Print_ISBN :
978-0-7695-3501-2
Type :
conf
DOI :
10.1109/CMC.2009.327
Filename :
4797297
Link To Document :
بازگشت