DocumentCode
473133
Title
Using Vulnerability Analysis to Model Attack Scenario for Collaborative Intrusion Detection
Author
Liu, Xuejiao ; Xiao, Debao
Author_Institution
Dept. Comput. Sci., HuaZhong Normal Univ., Wuhan
Volume
2
fYear
2008
fDate
17-20 Feb. 2008
Firstpage
1273
Lastpage
1277
Abstract
Intrusion detection is an important part of network security protection. Traditional intrusion detection systems (IDSs) only focus on low-level attacks and raise alerts independently, though there may be logical connections between them. At the same time, the amount of alerts becomes unmanageable including actual alerts mixed with false alerts. Therefore, improved techniques are needed. The general idea is to introduce collaboration achieved by taking advantage of vulnerability analysis as contextual information and thus enable IDSs to correctly identify successful attacks while simultaneously reducing the number of false positives and providing a stronger validation attack scenario. In particular, with the verification pattern with precondition and effect of successful attack and necessary context (mainly modeled as host and connectivity information), the architecture that proposes in this paper can reduce the false alert rate and identify true alerts corresponding to successful attacks to construct attack scenario. Through the experimental results with DARPA Data Sets 2000 from Lincoln laboratory and the Treasure Hunt Dataset, it demonstrates the potential of the proposed techniques.
Keywords
Internet; security of data; DARPA Data Sets 2000; Lincoln laboratory; Treasure Hunt Dataset; collaborative intrusion detection; model attack scenario; network security protection; verification pattern; vulnerability analysis; Collaboration; Collaborative tools; Computer networks; Computer science; Computer security; Floods; IP networks; Information security; Intrusion detection; Protection; attack scenario; intrusion detection; verification pattern; vulnerability analysis;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on
Conference_Location
Gangwon-Do
ISSN
1738-9445
Print_ISBN
978-89-5519-136-3
Type
conf
DOI
10.1109/ICACT.2008.4493996
Filename
4493996
Link To Document