Reasoning About Complementary Intrusion Evidence
2004, 20th Annual Computer Security Applications Conference
https://doi.org/10.1109/CSAC.2004.29Abstract
To facilitate the modeling of intrusion evidence, this paper classifies intrusion evidence into either event-based evidence or state-based evidence. Event-based evidence refers to observations (or detections) of intrusive actions (e.g., IDS alerts), while state-based evidence refers to observations of the effects of intrusions on system states. Based on the interdependency between event-based and state-based evidence, this paper develops techniques to automatically integrate complementary evidence into Bayesian networks, and reason about uncertain or unknown intrusion evidence based on verified evidence. The experimental results in this paper demonstrate the potential of the proposed techniques. In particular, additional observations by system monitoring or vulnerability scanning tools can potentially reduce the false alert rate and increase the confidence in alerts corresponding to successful attacks.
References (31)
- checkrootkit. http://www.checkrootkit.org. Ac- cessed on Feb. 4, 2004.
- Javabayes. http://www-2.cs.cmu.edu/ ˜javabayes/Home/. Accessed on Oct 10, 2003.
- Nessus. http://www.nessus.org. Accessed on Feb. 4, 2004.
- Samhain. http://la-samhna.de/samhain/. Ac- cessed on April 4, 2004.
- Tripwire. http://www.tripwire.com. Accessed on Feb. 4, 2004.
- P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph- based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Se- curity, pages 217-224, November 2002.
- F. Cuppens. Managing alerts in a multi-intrusion detection environment. In Proceedings of the 17th Annual Computer Security Applications Conference, December 2001.
- F. Cuppens and A. Miege. Alert correlation in a cooperative intrusion detection framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, May 2002.
- F. Cuppens and R. Ortalo. LAMBDA: A language to model a database for detection of attacks. In Proc. of Recent Ad- vances in Intrusion Detection (RAID 2000), pages 197-216, September 2000.
- O. Dain and R.K. Cunningham. Building scenarios from a heterogeneous alert stream. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, pages 231-235, June 2001.
- O. Dain and R.K. Cunningham. Fusing a heterogeneous alert stream into scenarios. In Proceedings of the 2001 ACM Workshop on Data Mining for Security Applications, pages 1-13, November 2001.
- H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85 -103, 2001.
- S.T. Eckmann, G. Vigna, and R.A. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. Jour- nal of Computer Security, 10(1/2):71-104, 2002.
- D. Farmer and W. Venema. SATAN: Security administrator tool for analyzing networks. http://142.3.223.54/ ˜short/SECURITY/satan.html.
- Fyodor. Nmap free security scanner. http://www. insecure.org/nmap, 2003.
- F.V. Jensen. Bayesian Networks and Decision Graphs. Statistics for Engineering and Information Science. Springer, 2001.
- K. Julisch. Mining alarm clusters to improve alarm handling efficiency. In Proceedings of the 17th Annual Computer Se- curity Applications Conference (ACSAC), pages 12-21, De- cember 2001.
- K. Julisch and M. Dacier. Mining intrusion detection alarms for actionable knowledge. In The 8th ACM International Conference on Knowledge Discovery and Data Mining, July 2002.
- MIT Lincoln Lab. 1999 DARPA intrusion detection scenario specific datasets. http://www.ll.mit.edu/IST/ ideval/data/1999/1999_data_index.html, 1999.
- B. Morin, L. Mé, H. Debar, and M. Ducassé. M2D2: A for- mal data model for IDS alert correlation. In Proceedings of the 5th International Symposium on Recent Advances in In- trusion Detection (RAID 2002), pages 115-137, 2002.
- P. Ning, Y. Cui, and D. S Reeves. Constructing attack sce- narios through correlation of intrusion alerts. In Proceedings of the 9th ACM Conference on Computer and Communica- tions Security, pages 245-254, Washington, D.C., November 2002.
- P. Ning, D. Xu, C. Healey, and R. St. Amant. Building at- tack scenarios through integration of complementary alert correlation methods. In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04), pages 97-111, February 2004.
- P.A. Porras, M.W. Fong, and A. Valdes. A mission-impact- based approach to INFOSEC alarm correlation. In Proceed- ings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), pages 95-114, 2002.
- M. Roesch. Snort -lightweight intrusion detection for net- works. In Proceedings of the 1999 USENIX LISA confer- ence, 1999.
- O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J.M. Wing. Automated generation and analysis of attack graphs. In Pro- ceedings of IEEE Symposium on Security and Privacy, May 2002.
- S. Staniford, J.A. Hoagland, and J.M. McAlerney. Practical automated detection of stealthy portscans. Journal of Com- puter Security, 10(1/2):105-136, 2002.
- Tauscan. http://www.agnitum.com/products/ tauscan/.
- S. Templeton and K. Levitt. A requires/provides model for computer attacks. In Proceedings of New Security Paradigms Workshop, pages 31 -38. ACM Press, September 2000.
- A. Valdes and K. Skinner. Probabilistic alert correlation. In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), pages 54-68, 2001.
- X-scan. http://www.xfocus.org.
- Y. Zhai, P. Ning, P. Iyer, and D.S. Reeves. Reasoning about complementary intrusion evidence. Technical Report TR- 2004-25, Department of Computer Science, North Carolina State University, 2004.