Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7136))

Abstract

ACARM-ng is an extensible, plug-in-based alert correlation framework. It introduces abstractions over correlation, reporting, reaction, gathering data from multiple sources and data storage. ACARM-ng supports real-time reporting, meaning that alerts can be reported while still being correlated. For an administrator, a Web User Interface is provided, to present gathered and correlated data in a consistent way. The system makes use of multi-core architectures and is written in C++.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ACARM home page (first version) (2009), http://www.acarm.wcss.wroc.pl

  2. ACARM-ng home page (2010), http://www.acarm.wcss.wroc.pl

  3. Adams, J., William J.: Lynn meets with NATO leaders for Cybersecurity Discussions (2010)

    Google Scholar 

  4. AMD Opteron 12-core CPU (2011), http://www.amd.com/us/products/pricing/Pages/server-opteron.aspx

  5. Cuppens, F., Miège, A.: Alert correlation in a cooperative intrusion detection framework. In: IEEE Symposium on Security and Privacy, pp. 202–215 (2002)

    Google Scholar 

  6. Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R.A.: A comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing 1 (2004)

    Google Scholar 

  7. Gadu-Gadu instant messaging protocol, http://www.gadu-gadu.pl

  8. Debar, H., Curry, D., Feinstein, B.: RFC 4765: The intrusion detection message exchange format (IDMEF) (2007)

    Google Scholar 

  9. Helman, P., Liepins, G., Richards, W.: Foundations of intrusion detection. In: The IEEE Computer Security Foundations Workshop V (1992)

    Google Scholar 

  10. Jabber XMMP-based communicator, http://www.jabber.org

  11. Jones, A.K., Sielken, R.S.: Computer system intrusion detection: A survey. Tech. rep., University of Virginia, Charlottesville, VA (1999)

    Google Scholar 

  12. Ning, P., Cui, Y., Reeves, D.S.: Analyzing Intensive Intrusion Alerts via Correlation. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 74–94. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  13. Nova – computing cluster at WCSS, http://www.kdm.wcss.wroc.pl/wiki/Nova

  14. OSSEC – host-based intrusion detection system, http://www.ossec.net

  15. OSSIM – open source security information management, http://www.ossim.net

  16. Postgresql open source database, http://www.postgresql.org

  17. Prelude intrusion detection system, http://www.prelude-technologies.com

  18. Rootkit Hunter project, http://rkhunter.sourceforge.net

  19. Rose, M.: RFC 3080: BEEP – The Blocks Extensible Exchange Protocol (2011)

    Google Scholar 

  20. Snort intrusion detection system, http://www.snort.org

  21. SQLite – server-less, transactional database, http://www.sqlite.org

  22. Sutter, H.: The free lunch is over: a fundamental turn toward concurrency in software (2009)

    Google Scholar 

  23. Wrocław Centre for Networking and Supercomputing, http://www.wcss.wroc.pl

Download references

Author information

Authors and Affiliations

Authors

Editor information

Marian Bubak Tomasz Szepieniec Kazimierz Wiatr

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Balcerek, B., Szurgot, B., Uchroński, M., Waga, W. (2012). ACARM-ng: Next Generation Correlation Framework. In: Bubak, M., Szepieniec, T., Wiatr, K. (eds) Building a National Distributed e-Infrastructure–PL-Grid. Lecture Notes in Computer Science, vol 7136. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28267-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28267-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28266-9

  • Online ISBN: 978-3-642-28267-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics