节点文献

警报关联分析工具的研究及改进

Research and Improvement of the Toolkit of Correlating and Analyzing Alerts

【作者】 李东

【导师】 胡亮;

【作者基本信息】 吉林大学 , 计算机应用技术, 2008, 硕士

【摘要】 入侵检测的研究已经进行了20多年,入侵检测系统是一种主动保护计算机免受入侵者攻击的新型计算机网络安全系统,提供了对内部攻击外部攻击和误操作的实时保护,在网络系统受到危害之前拦截和响应入侵。但是传统的IDS与有两个主要的缺陷,一个是大多数IDS只检测底层的攻击和异常,尽管产生的警报在逻辑上是有关联的,但是IDS只单独的产生警报。另一个是IDS产生大量的误报警,混在真的警报中让人们无法分辨,IDS的误报和漏报问题一直没有很好的解决方法。因此,警报关联的研究越来越被人们所重视,在最近几年,警报关联的研究越来越活跃,一种基于先决条件的报警关联方法被提出,这种方法的优点是:第一,提供了相关警报的一个高层次表示,揭示了一系列攻击的结构;第二,由于只保持相关警报,能减少误报的影响;第三,可能用于预报正在进行中的攻击,允许入侵响应系统采取相应动作停止正在进行的攻击。TIAA是一种离线警报分析工具,有三个子系统组成:警报收集子系统,警报相关子系统,交互式分析系统,他们以知识库和数据库为核心。本文从警报关联的研究背景和意义出发,分析了警报错误率高的原因,介绍了警报关联框架及警报关联相关知识,详细阐述了警报关联的几个效用的功能。详细介绍了TIAA的安装使用方法,并使用DARPA2000数据集进行了测试。由于分布式入侵检测系统中传感器数量和种类很多,产生的冗余警报比较多,为了减少冗余警报,本文改进了频繁闭模式数据挖掘算法,引入了模糊集合的概念,使用该算法对警报数据进行挖掘,达到减少冗余警报的目的。

【Abstract】 Intrusion Detection has been studied for about twenty years. Intrusion Detection Systems (IDSs) are usually considered the second line of defense to protect against malicious activities along with the prevention-based security mechanisms such as authentication and access control. However, traditional IDSs have two major weaknesses. First, they usually focus on low-level attacks or anomalies, and raise alerts independently, though the re may be logical connections between them. Second, there are a lot of false alerts reported by traditional IDSs, which are mixed with true alerts. We propose a technique to correlate the alerts by using their prerequisites and consequences in order to solve the problem. The method using prerequisites and consequences has three advantages: 1) provide a higher level scenarios of correlated alerts and implicate the structure of the attack.2) It can reduce the rate of producing false alerts after the attention is focused on alerts that are correlated with others.3) while someone is attacking, it can preview the attacking and prevent the attacking by IDS.We propose a framework of correlating alerts, which contains four parts: prerequisite and consequence of attacks, hyper-alert type and hyper- -alert, hyper-alert correlation graph, utilities for interactively analyzing alerts. Predicates are the basic constructs to represent prerequisites and consequences of attacks. For example, a scanning attack may discover UDP services vulnerable to a certain buffer overflow attack. We can use the predicate UDPVulnerableToBOF (VictimIP, VictimPort) to represent the attacker’s discovery. Similarly, if an attack requires a UDP service vulnerable to the buffer overflow attack, we can use the same predicate to represent the prerequisite. A hyper-alert type T is a triple (fact, prerequi- -site, consequence), where (1) fact is a set of attribute names, each with an associated domain of values, (2) prerequisite is a logical combination of predicates whose free variables are all in fact, and (3) consequence is a set of predicates such that all the free variables in consequence are in fact. The hyper-alert correlation graph is not only an intuitive representation of attack scenarios constructed through alert correlation, but also reveals opportunities to improve intrusion detection. First, the hyper-alert corre lation graph can potentially reveal the intrusion strategies behind the attacks, and lead to better understanding of the attacker’s intention. Second, assuming some attackers exhibit patterns in their strategies, we can use the hyper-alert correlation graph to profile previous attacks and identify on-going attacks by matching to the profiles. A partial match to the profile may indicate attacks possibly missed by the IDSs, and lead to human investigation and improvement of the IDSs. Utilities can help analysts get as much information as possible and make the best judgment. These utilities are then integrated into one system (which we will present in the next section), which provides human analysts platform to examine correlated intrusion alerts interactively and progressively. TIAA is an off-line toolkit for analyzing the alerts of IDS. TIAA contains three Subsystems: Alert Collection Subsystem, Alert Correlation Subsystem, and Interactive Alert Analysis Subsystem. TIAA is implemented in Java, with JDBC to access the database. To save development effort, TIAA uses the GraphViz package as the visualization engine to generate the graphical representation of the analysis results. TIAA relies on a knowledge base for prior knowledge about different types of alerts as well as implication relationships between predicates. Because of the need for human analysts to write and possibly revise the knowledge base, the knowledge base is represented in an XML format. TIAA uses the Apache Xerces2 Java Parser [Xer ] to facilitate the manipulation of the knowledge base.Data mining is widely used in kinds of area. In the research of IDS, Data mining is also a very important subject. We improve the method of close frequent pattern to mining the data of alerts generated by IDS. It can reduce the misuse alerts of IDS.This paper analysis the reason of the high rate of false alerts, presents the framework of alert collection and other related knowledge. This paper introduce the utilities of alert collection particularly, and the way of using and installing TIAA. This paper also presents a method of data mining which called close frequent pattern method to improve the function of TIAA.

【关键词】 入侵检测警报关联TIAA频繁闭模式
  • 【网络出版投稿人】 吉林大学
  • 【网络出版年期】2008年 10期
  • 【分类号】TP393.08
  • 【下载频次】123
节点文献中: 

本文链接的文献网络图示:

本文的引文网络