Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Decentralized multi-dimensional alert correlation for collaborative intrusion detection

Published: 01 September 2009 Publication History

Abstract

The growth in coordinated network attacks such as scans, worms and distributed denial-of-service (DDoS) attacks is a profound threat to the security of the Internet. Collaborative intrusion detection systems (CIDSs) have the potential to detect these attacks, by enabling all the participating intrusion detection systems (IDSs) to share suspicious intelligence with each other to form a global view of the current security threats. Current correlation algorithms in CIDSs are either too simple to capture the important characteristics of attacks, or too computationally expensive to detect attacks in a timely manner. We propose a decentralized, multi-dimensional alert correlation algorithm for CIDSs to address these challenges. A multi-dimensional alert clustering algorithm is used to extract the significant intrusion patterns from raw intrusion alerts. A two-stage correlation algorithm is used, which first clusters alerts locally at each IDS, before reporting significant alert patterns to a global correlation stage. We introduce a probabilistic approach to decide when a pattern at the local stage is sufficiently significant to warrant correlation at the global stage. We then implement the proposed two-stage correlation algorithm in a fully distributed CIDS. Our experiments on a large real-world intrusion data set show that our approach can achieve a significant reduction in the number of alert messages generated by the local correlation stage with negligible false negatives compared to a centralized scheme. The proposed probabilistic threshold approach gains a significant improvement in detection accuracy in a stealthy attack scenario, compared to a naive scheme that uses the same threshold at the local and global stages. A large scale experiment on PlanetLab shows that our decentralized architecture is significantly more efficient than a centralized approach in terms of the time required to correlate alerts.

References

[1]
Axelsson S. The base-rate fallacy and its implications for the difficulty of intrusion detection. In: ACM conference on computer and communications security, 1999. p. 1-7.
[2]
Statistical concepts and methods. Wiley, New York.
[3]
Space/time trade-offs in hash coding with allowable errors. Communications of the ACM. v13 i7. 422-426.
[4]
CERT Coordination Center (CERT/CC). CERT advisory CA-1996-21 TCP SYN flooding and IP spoofing attacks {online}. Available: {http://www.cert.org/advisories/CA-1996-21.html}, 1996.
[5]
CERT Coordination Center (CERT/CC). CERT incident note IN-99-07 {online}. Available: {http://www.cert.org/incident_notes/IN-99-07.html}, 1999.
[6]
CERT Coordination Center (CERT/CC). CERT advisory CA-2003-04 MS-SQL server worm {online}. Available: {http://www.cert.org/advisories/CA-2003-04.html}, 2003a.
[7]
CERT Coordination Center (CERT/CC). CERT advisory CA-2003-20 W32/Blaster worm {online}. Available: {http://www.cert.org/advisories/CA-2003-20.html}, 2003b.
[8]
Cheung S, Lindqvist U, Fong MW. Modeling multistep cyber attacks for scenario recognition. In: Proceedings of the third DARPA information survivability conference and exposition (DISCEX), 2003. p. 284-92.
[9]
Dain O, Cunningham R. Fusing a heterogeneous alert stream into scenarios. In: Proceedings of the 2001 ACM workshop on data mining for security applications, 2001. p. 1-13.
[10]
Estan C, Savage S, Varghese G. Automatically inferring patterns of resource consumption in network traffic. In: Proceedings of the 2003 conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM), 2003. p. 137-48.
[11]
Gibson S. Distributed reflection denial of service-description and analysis of a potent, increasingly prevalent, and worrisome Internet attack {online}. Available: {http://www.grc.com/dos/drdos.htm}, 2002.
[12]
Adaptive flow aggregation-a new solution for Robust flow monitoring under security attacks. In: Proceedings of the 10th IEEE/IFIP network operations and management symposium (NOMS), pp. 424-435.
[13]
Internet Storm Center, DShield.org. {online}. Available: {http://www.dshield.org}.
[14]
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In: Proceedings of the 11th international conference on World Wide Web (WWW), pp. 293-304.
[15]
Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web. In: Proceedings of the 29th annual ACM symposium on theory of computing, pp. 654-663.
[16]
Collaborating against common enemies. In: Proceedings of the fifth ACM SIGCOMM conference on Internet measurement, pp. 1-14.
[17]
Lakhina A, Crovella M, Diot C. Mining anomalies using traffic feature distributions. In: Proceedings of the 2005 conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM), 2005. p. 217-28.
[18]
Locasto M, Parekh J, Keromytis A, Stolfo S. Towards collaborative security and P2P intrusion detection. In: Proceedings of the 2005 IEEE workshop on information assurance and security, 2005. p. 333-9.
[19]
Princeton University, "PlanetLab Testbed" {online}. Available: {http://www.planet-lab.org}.
[20]
Xu K, Zhang Z-L, Bhattacharyya S. Profiling Internet backbone traffic: behavior models and applications. In: Proceedings of the 2005 conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM), 2005. p. 169-80.
[21]
Yegneswaran V, Barford P, Jha S. Global intrusion detection in the DOMINO overlay system in proceedings of network and distributed security symposium (NDSS), 2004.
[22]
Zhou CV, Karunasekera S, Leckie C. Evaluation of a decentralized architecture for large scale collaborative intrusion detection. In: Proceedings of the 10th IFIP/IEEE international symposium on integrated network management (IM), Germany, 2007. p. 80-9.

Cited By

View all
  • (2024)Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous networkInternational Journal of Information Security10.1007/s10207-024-00891-323:5(3329-3349)Online publication date: 1-Oct-2024
  • (2022)Hybrid Collaborative Architectures For Intrusion Detection In Multi-Access Edge ComputingNOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS54207.2022.9789795(1-7)Online publication date: 25-Apr-2022
  • (2021)Multi-Stage Attack Detection via Kill Chain State MachinesProceedings of the 3rd Workshop on Cyber-Security Arms Race10.1145/3474374.3486918(13-24)Online publication date: 19-Nov-2021
  • Show More Cited By
  1. Decentralized multi-dimensional alert correlation for collaborative intrusion detection

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Journal of Network and Computer Applications
    Journal of Network and Computer Applications  Volume 32, Issue 5
    September, 2009
    184 pages

    Publisher

    Academic Press Ltd.

    United Kingdom

    Publication History

    Published: 01 September 2009

    Author Tags

    1. Alert correlation
    2. Collaborative intrusion detection
    3. Distributed networks
    4. Network-level security and protection
    5. Peer-to-peer networks
    6. Stealthy scan detection
    7. Worm detection

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous networkInternational Journal of Information Security10.1007/s10207-024-00891-323:5(3329-3349)Online publication date: 1-Oct-2024
    • (2022)Hybrid Collaborative Architectures For Intrusion Detection In Multi-Access Edge ComputingNOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS54207.2022.9789795(1-7)Online publication date: 25-Apr-2022
    • (2021)Multi-Stage Attack Detection via Kill Chain State MachinesProceedings of the 3rd Workshop on Cyber-Security Arms Race10.1145/3474374.3486918(13-24)Online publication date: 19-Nov-2021
    • (2021)Using homomorphic encryption for privacy-preserving clustering of intrusion detection alertsInternational Journal of Information Security10.1007/s10207-020-00506-720:3(347-370)Online publication date: 1-Jun-2021
    • (2020)A Distributed Intrusion Detection Scheme for Cloud ComputingInternational Journal of Distributed Systems and Technologies10.4018/IJDST.202001010611:1(68-82)Online publication date: 1-Jan-2020
    • (2020)Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchainInternational Journal of Information Security10.1007/s10207-019-00462-x19:3(279-290)Online publication date: 1-Jun-2020
    • (2019)On the alert correlation process for the detection of multi-step attacks and a graph-based realizationACM SIGAPP Applied Computing Review10.1145/3325061.332506219:1(5-19)Online publication date: 8-Apr-2019
    • (2018)Intrusion detection taxonomy and data preprocessing mechanismsJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-16943234:3(1369-1383)Online publication date: 1-Jan-2018
    • (2018)GACProceedings of the 33rd Annual ACM Symposium on Applied Computing10.1145/3167132.3167239(979-988)Online publication date: 9-Apr-2018
    • (2017)A change-point DDoS attack detection method based on half interaction anomaly degreeInternational Journal of Autonomous and Adaptive Communications Systems10.1504/IJAACS.2017.08273710:1(38-54)Online publication date: 1-Jan-2017
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media