Skip to main content

Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis

  • Conference paper
  • First Online:
Information Security (ISC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2200))

Included in the following conference series:

Abstract

To solve the contradiction between the trend of more distributed network architecture and the demanding for more centralized correlated analysis to detect more complicated attacks from Intrusion Detection System (IDS), we first proposed in this paper an IDS architecture framework, which could collect relevant detected alert data from distributed diverse IDSes into one or more centralized point(s), and then efficient correlation analysis would be processed on shared data, after that, the meaningful and supportive knowledge rules from analysis results were be generated and automatically pushed back to each subscribed local IDS on scheduled time or even in real time, so that local IDS could utilize these rules to analyze new coming traffic. We also defined the XML format for those knowledge rule information generated by our hacking behavior correlation algorithms. We then presented seven mathematical algorithms on correlated hacking behavior analysis. In order for local IDS to effectively measure the false positive possibility of a new coming alert, we introduced three different approaches using some data mining and statistic models, including 1-Rule, Bagging Method and Native Bayer Method. By applying these methods to utilize and analyze the collected correlated knowledge rules, we could derive quite good quality of true attack confidence value for each coming detected alert. We also developed a simulation program implementing all these correlation algorithms and all those data mining and statistic models. We simply tested these algorithms with MIT Lincoln Lab’s 1999 IDS evaluation data, and concluded that by utilizing these preliminary results, local IDS subscribed to this framework could derive a certain measurement of how confident an alarm is true attack in real time manner and even lower false positive rate if certain threshold applied.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Steven Hofmeyr, Stephanie Forrest, Patrik D’haeseleer “Distributed Network Intrusion Detection, An Immunological Approach”, Dept. of Computer Science, University of New Mexico, May 1999

    Google Scholar 

  2. Herve Debar, Ming-Yuh Huang, David J. Donahoo “Intrusion Detection Exchange Format Data Model”, Internet Engineering Task Force, IDWG, IBM Corp./The Boeing Company/AFIWC, March 2000

    Google Scholar 

  3. “Intrusion Alert Protocol-IAP”, Internet Engineering Task Force, IDWG, Gupta, Hewlett-Packard, March 2000

    Google Scholar 

  4. Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, Ed Stoner, “State of the Practice of Intrusion Detection Technologies”, Carnegie Mellon Software Engineering Insititute, Jan 2000

    Google Scholar 

  5. Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das, “The 1999 DARPA Off-Line Intrusion Detection Evaluation”, Lincoln Laboratory MIT, 2000

    Google Scholar 

  6. Ming-Yuh Huang, Thomas M. Wicks, “A Large-Scale Distributed Intrusion Detection Framework Baed on Attack Strategy Analysis”, The Boeing Company

    Google Scholar 

  7. Ian H. Witten, Eibe Frank, “Data Mining, Practical Machine Learning Tools and Techniques with Java Implementations”, University of Waikato, 2000. Morgan Kaufmann Publishers.

    Google Scholar 

  8. Y. Frank Jou, Shyhtsun Felix Wu, Fengmin Gong, W. Rance Cleaveland, Chandru Sargor, “Architecture Design of a Scalable Intrusion Detection System for the Emerging Network Infrastructure”, North Carolina State University, Apr 1997

    Google Scholar 

  9. Peter Mell, “Understanding the World of your Enemy with I-CAT (Internet-Categorization of Attacks Toolkit)”, NIST, Computer Security Division, May 1999

    Google Scholar 

  10. Robert A. Clyde, Drew Williams, “Enterprise-wide Intrusion Detection, A multi-tiered approach”, AXENT Technologies, Inc, 1998

    Google Scholar 

  11. Peter G. Neumann and Phillip A. Porras, “Experience with EMERALD o Date”, SRI International, 1999

    Google Scholar 

  12. Steven Cheung, Rick Crawford, Mark Dilger, Jeremy Frank, Jim Hoagland, Karl Levitt, Jeff Rowe, Stuart G. Staniford-Chen, Raymond Yip, Dan Zerkle, “The Design of GrIDS: A Graph-Based Intrusion Detection System”, Jan 1999

    Google Scholar 

  13. Wenke Lee and Sal Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security, November 2000

    Google Scholar 

  14. Tim Bass, “Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems”, Silk Road & ERIM International, 1999

    Google Scholar 

  15. Salvatore J. Stolfo, Wei Fan, Wenke Lee, “Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project”, Columbia University, 1999

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, J., Lee, I. (2001). Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_36

Download citation

  • DOI: https://doi.org/10.1007/3-540-45439-X_36

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42662-2

  • Online ISBN: 978-3-540-45439-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics