• DocumentCode
    473133
  • Title

    Using Vulnerability Analysis to Model Attack Scenario for Collaborative Intrusion Detection

  • Author

    Liu, Xuejiao ; Xiao, Debao

  • Author_Institution
    Dept. Comput. Sci., HuaZhong Normal Univ., Wuhan
  • Volume
    2
  • fYear
    2008
  • fDate
    17-20 Feb. 2008
  • Firstpage
    1273
  • Lastpage
    1277
  • Abstract
    Intrusion detection is an important part of network security protection. Traditional intrusion detection systems (IDSs) only focus on low-level attacks and raise alerts independently, though there may be logical connections between them. At the same time, the amount of alerts becomes unmanageable including actual alerts mixed with false alerts. Therefore, improved techniques are needed. The general idea is to introduce collaboration achieved by taking advantage of vulnerability analysis as contextual information and thus enable IDSs to correctly identify successful attacks while simultaneously reducing the number of false positives and providing a stronger validation attack scenario. In particular, with the verification pattern with precondition and effect of successful attack and necessary context (mainly modeled as host and connectivity information), the architecture that proposes in this paper can reduce the false alert rate and identify true alerts corresponding to successful attacks to construct attack scenario. Through the experimental results with DARPA Data Sets 2000 from Lincoln laboratory and the Treasure Hunt Dataset, it demonstrates the potential of the proposed techniques.
  • Keywords
    Internet; security of data; DARPA Data Sets 2000; Lincoln laboratory; Treasure Hunt Dataset; collaborative intrusion detection; model attack scenario; network security protection; verification pattern; vulnerability analysis; Collaboration; Collaborative tools; Computer networks; Computer science; Computer security; Floods; IP networks; Information security; Intrusion detection; Protection; attack scenario; intrusion detection; verification pattern; vulnerability analysis;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on
  • Conference_Location
    Gangwon-Do
  • ISSN
    1738-9445
  • Print_ISBN
    978-89-5519-136-3
  • Type

    conf

  • DOI
    10.1109/ICACT.2008.4493996
  • Filename
    4493996