نمایش مختصر رکورد

dc.contributor.authorFarhadi, H.en_US
dc.contributor.authorAmirHaeri, M.en_US
dc.contributor.authorKhansari, M.en_US
dc.date.accessioned1399-07-08T19:44:49Zfa_IR
dc.date.accessioned2020-09-29T19:44:49Z
dc.date.available1399-07-08T19:44:49Zfa_IR
dc.date.available2020-09-29T19:44:49Z
dc.date.issued2011-07-01en_US
dc.date.issued1390-04-10fa_IR
dc.date.submitted2010-07-12en_US
dc.date.submitted1389-04-21fa_IR
dc.identifier.citationFarhadi, H., AmirHaeri, M., Khansari, M.. (2011). Alert correlation and prediction using data mining and HMM. The ISC International Journal of Information Security, 3(2), 77-101. doi: 10.22042/isecure.2015.3.2.3en_US
dc.identifier.issn2008-2045
dc.identifier.issn2008-3076
dc.identifier.urihttps://dx.doi.org/10.22042/isecure.2015.3.2.3
dc.identifier.urihttp://www.isecure-journal.com/article_39189.html
dc.identifier.urihttps://iranjournals.nlai.ir/handle/123456789/73360
dc.description.abstractIntrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which extracts useful and high-level alerts, and helps to make timely decisions when a security breach occurs. In this paper, we propose an alert correlation system consisting of two major components; first, we introduce an Attack Scenario Extraction Algorithm (ASEA), which mines the stream of alerts for attack scenarios. The ASEA has a relatively good performance, both in speed and memory consumption. Contrary to previous approaches, the ASEA combines both prior knowledge as well as statistical relationships. Second, we propose a Hidden Markov Model (HMM)-based correlation method of intrusion alerts, fired from different IDS sensors across an enterprise. We use HMM to predict the next attack class of the intruder, also known as <em>plan recognition</em>. This component has two advantages: Firstly, it does not require any usage or modeling of network topology, system vulnerabilities, and system configurations; Secondly, as we perform high-level prediction, the model is more robust against over-fitting. In contrast, other published plan-recognition methods try to predict exactly the next attacker action. We applied our system to DARPA 2000 intrusion detection scenario dataset. The ASEA experiment shows that it can extract attack strategies efficiently. We evaluated our plan-recognition component both with supervised and unsupervised learning techniques using DARPA 2000 dataset. To the best of our knowledge, this is the first unsupervised method in attack plan recognition.en_US
dc.format.extent1172
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoen_US
dc.publisherIranian Society of Cryptologyen_US
dc.relation.ispartofThe ISC International Journal of Information Securityen_US
dc.relation.isversionofhttps://dx.doi.org/10.22042/isecure.2015.3.2.3
dc.subjectAlert Correlationen_US
dc.subjectMultistep Attack Scenarioen_US
dc.subjectPlan Recognitionen_US
dc.subjectHidden Markov Modelen_US
dc.subjectIntrusion Detectionen_US
dc.subjectStream Miningen_US
dc.titleAlert correlation and prediction using data mining and HMMen_US
dc.typeTexten_US
dc.typeORIGINAL RESEARCH PAPERen_US
dc.citation.volume3
dc.citation.issue2
dc.citation.spage77
dc.citation.epage101


فایل‌های این مورد

Thumbnail

این مورد در مجموعه‌های زیر وجود دارد:

نمایش مختصر رکورد