Adaptive Feature-Weighted Alert Correlation System Applicable in Cloud Environment

Chih-Hung Wang, Ji-Min Yang
{"title":"Adaptive Feature-Weighted Alert Correlation System Applicable in Cloud Environment","authors":"Chih-Hung Wang, Ji-Min Yang","doi":"10.1109/ASIAJCIS.2013.14","DOIUrl":null,"url":null,"abstract":"Growing with the technology, there are many new attack techniques presented in the cloud environment. Different from the general server, once the cloud environment suffered from malicious attacks, people or companies will get caught in extreme dangers. Therefore, it is important for network security in cloud. Since there are a lot of packets in network traffic including malicious packets, huge amounts of alerts will be generated by the intrusion detection system. Analyzing these alert data is time-consuming and it is difficult to obtain the attack steps and strategies immediately by directly performing these analyses. We proposed an adaptive feature-weighted alert correlation system that employs a Bayesian Network to choose the features with high relevance and then adjusts the feature weights according to the statistics of Bayesian Network in a period of time. We estimate the correlation probability of two alerts with the relevant features by using the Feature Wight Matrix, and the correlation probability is recorded in Alert Correlation Matrix. Using the information in Alert Correlation Matrix, we can extract high level attack strategies and construct attack graphs. In our system, facing a great deal of network traffic, the administrator can accurately recognize intruders' intentions and learn about the attack probabilities and network security situations.","PeriodicalId":286298,"journal":{"name":"2013 Eighth Asia Joint Conference on Information Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Eighth Asia Joint Conference on Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASIAJCIS.2013.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Growing with the technology, there are many new attack techniques presented in the cloud environment. Different from the general server, once the cloud environment suffered from malicious attacks, people or companies will get caught in extreme dangers. Therefore, it is important for network security in cloud. Since there are a lot of packets in network traffic including malicious packets, huge amounts of alerts will be generated by the intrusion detection system. Analyzing these alert data is time-consuming and it is difficult to obtain the attack steps and strategies immediately by directly performing these analyses. We proposed an adaptive feature-weighted alert correlation system that employs a Bayesian Network to choose the features with high relevance and then adjusts the feature weights according to the statistics of Bayesian Network in a period of time. We estimate the correlation probability of two alerts with the relevant features by using the Feature Wight Matrix, and the correlation probability is recorded in Alert Correlation Matrix. Using the information in Alert Correlation Matrix, we can extract high level attack strategies and construct attack graphs. In our system, facing a great deal of network traffic, the administrator can accurately recognize intruders' intentions and learn about the attack probabilities and network security situations.
适用于云环境的自适应特征加权报警关联系统
随着技术的发展,云环境中出现了许多新的攻击技术。与一般的服务器不同,云环境一旦受到恶意攻击,个人或企业将陷入极端的危险之中。因此,云环境下的网络安全至关重要。由于网络流量中存在大量的报文,其中包括恶意报文,入侵检测系统会产生大量的告警。分析这些警报数据非常耗时,并且很难通过直接执行这些分析来立即获得攻击步骤和策略。我们提出了一种自适应特征加权报警关联系统,该系统利用贝叶斯网络选择相关度较高的特征,然后根据贝叶斯网络在一段时间内的统计调整特征权重。我们利用特征权重矩阵估计两个警报与相关特征的相关概率,并将相关概率记录在警报相关矩阵中。利用预警关联矩阵中的信息,可以提取高级攻击策略,构造攻击图。在我们的系统中,面对巨大的网络流量,管理员可以准确地识别入侵者的意图,了解攻击概率和网络安全状况。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信