Title :
The Analysis of Event Correlation in Security Operations Center
Author :
Zhang, Deyang ; Zhang, Dedong
Author_Institution :
Sch. of Inf. & Electron. Eng., Hebei Univ. of Eng., Handan, China
Abstract :
Many security events occur in computer networks and most of them are not isolated. In other words, there are many relationships among the events that are called redundancy relationship or causality. As the events are massive, correlation analysis is very important. This paper analyzes the current algorithm of event correlation and proposes a security events correlation method. This method unifies the security events from different security equipments and sorts them firstly, then combines the security events by the similarity, finally extracts correlation rules among security events utilizing data mining. It can decrease the number of alert, reduce false alert and discover high-level attack strategies.
Keywords :
computer network security; data mining; computer networks; data mining; event correlation analysis; high-level attack strategies; redundancy causality; redundancy relationship; security events correlation method; security operations center; Computer architecture; Correlation; Data mining; IP networks; Intrusion detection; Redundancy; Correlation Analysis; Correlation Rules; Security Operations Center; Similarity;
Conference_Titel :
Intelligent Computation Technology and Automation (ICICTA), 2011 International Conference on
Conference_Location :
Shenzhen, Guangdong
Print_ISBN :
978-1-61284-289-9
DOI :
10.1109/ICICTA.2011.584