IDS False Alarm Reduction Using Continuous and Discontinuous Patterns
Intrusion Detection Systems (IDSs) are widely deployed in computer networks to stand against a wide variety of attacks. IDSs deployment raises a serious problem, namely managing of a large number of triggered alerts. This problem becomes worse by the fact that some commercial IDSs may generate thousands of alerts per day. Identifying the real alarms from the huge volume of alarms is a frustrating task for security officers. Thus, reducing false alarms is a critical issue in IDSs efficiency and usability. In this paper, we mine historical alarms to learn how future alarms can be handled more efficiently. First, an approach is proposed for characterizing the “normal” stream of alarms. In addition, an algorithm for detecting anomalies by using continuous and discontinuous sequential patterns is developed, and used in preliminary experiments with real-world data to show that the presented model can handle IDSs alarms efficiently.
KeywordsIntrusion detection alarm reduction sequential patterns
Unable to display preview. Download preview PDF.
- 1.The 2004 E-Crime Watch survey (2004), available at: http://www.csoonline.com/releases/ecrimewatch04.pdf
- 2.Kumar, S., Spafford, E.H.: A Software Architecture to Support Misuse Intrusion Detection. In: Proceedings of the 18th National Information Security Conference, pp. 194–204 (1995)Google Scholar
- 3.Forrest, S., Hofmeyr, S.A., Somayaji, A., Logstaff, T.A.: A Sense of Self for Unix process. In: Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, pp. 120–128 (1996)Google Scholar
- 5.Javitz, H.S., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In: IEEE Symposium on Security and Privacy, May 1991, SRI International, Oakland (1991)Google Scholar
- 9.Julisch, K.: Mining Alarm Clusters to Improve Alarm Handling Effciency. In: 17th Annual Computer Security Applications Conference (ACSAC), December 2001, pp. 12–21 (2001)Google Scholar
- 14.DARPA Dataset, http://www.ll.mit.edu/IST/ideval/
- 15.Snort: http://www.snort.org/
- 16.Roesch, M.: Snort – lightweight intrusion detection system for networks. In: Proceedings of USENIX LISA 1999 (1999)Google Scholar
- 17.Clifton, C., Gengo, G.: Developing Custom Intrusion Detection Filters Using Data Mining. In: Military Communications Int’l Symposium (MILCOM 2000)(October 2000)Google Scholar
- 19.Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting Intrusions by Data Mining. In: IEEE Workshop on Information Assurance and Security (2001)Google Scholar
- 22.Staniford, S., Hoagland, J.A., McAlerney, J.M.: Practical Automated Detection of Stealthy Portscans. In: ACM Computer and Communications Security IDS Workshop, pp. 1–7 (2000)Google Scholar