Integrating Alerts From Multiple Homogeneous Intrusion Detection Systems

dc.contributor.advisorDr. Peng Ning, Committee Chairen_US
dc.contributor.advisorDr. Rudra Dutta, Committee Memberen_US
dc.contributor.advisorDr. Douglas S. Reeves, Committee Memberen_US
dc.contributor.authorSerrano, Alfredoen_US
dc.date.accessioned2010-04-02T17:58:12Z
dc.date.available2010-04-02T17:58:12Z
dc.date.issued2003-06-06en_US
dc.degree.disciplineComputer Scienceen_US
dc.degree.levelthesisen_US
dc.degree.nameMSen_US
dc.description.abstractIntrusion Detection is a relatively young area of research, begun in the early 1980's. Currently most intrusion detection systems (IDSs) produce a large number of alerts based on low level attacks or anomalies. More distressing is that a large number of alerts are false positives. The false alert rate becomes even more important as networks become larger. Effectively monitoring a large network requires the deployment of multiple intrusion detection systems at key points on the network. Yet, this deployment increases the number of alerts that administrators must attend to. In addition, since most IDSs produce alerts based on low-level attacks, they give no indication about the relationship between alerts. In this work, we describe a method for correlating intrusion alerts from low level alerts produced by multiple homogenous IDSs. Our technique extends the intrusion alert correlation technique developed at North Carolina State University, which uses an intrusion alert's prerequisites and consequences to construct high-level attack scenarios. The prerequisite of an alert specifies what must be true in order for the corresponding attack to be successful, and the consequences describe what can possibly be true if the attack succeeds. The extended technique relaxes the temporal constrains on alert from different IDSs to account for any possible timestamp inconsistencies (due to network delays, lack of system clock synchronization, host workload). Our correlation method reduces alert volume, and improves performance with reduction in false positives compared to uncorrelated alerts. Our correlation of alerts from multiple intrusion systems provides for an automated method to show not only the relationship between alerts from one IDS, but also the relationships between alerts from different IDSs. Therefore, our method gives a more complete view of attack scenarios.en_US
dc.identifier.otheretd-05122003-173102en_US
dc.identifier.urihttp://www.lib.ncsu.edu/resolver/1840.16/761
dc.rightsI hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to NC State University or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report.en_US
dc.subjectIntrusion Detectionen_US
dc.subjectAlert Correlationen_US
dc.subjectIntrusion Detection Systemsen_US
dc.subjectSecurityen_US
dc.titleIntegrating Alerts From Multiple Homogeneous Intrusion Detection Systemsen_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
etd.pdf
Size:
2.8 MB
Format:
Adobe Portable Document Format

Collections