Correlating Alerts Using Prerequisites of Intrusions - PowerPoint PPT Presentation

1 / 33
About This Presentation
Title:

Correlating Alerts Using Prerequisites of Intrusions

Description:

Definition 8 Given a hyper-alert correlation graph CG = (N, E) and a hyper-alert ... This paper proposed a formal framework to represent and correlate hyper-alerts ... – PowerPoint PPT presentation

Number of Views:34
Avg rating:3.0/5.0
Slides: 34
Provided by: mash150
Category:

less

Transcript and Presenter's Notes

Title: Correlating Alerts Using Prerequisites of Intrusions


1
Correlating Alerts Using Prerequisites of
Intrusions
  • Peng Ning, Douglas S. Reeves, Yun Cui, Department
    of Computer Science
  • North Carolina State University, 2001

??????
2
Outline
  • Introduction
  • Related Work
  • Correlating Alerts Using Prerequisites of Attacks
  • Experimental Results
  • Discussion
  • Conclusion and Future Work

3
Introduction (1/2)
  • Current IDSs focus on low-level attacks or
    anomalies
  • A large number of alerts
  • A large number of false alerts
  • Can not capture the logical strategies behind
    these attacks
  • Cannot fully detect novel attacks or variations
    of known attacks

4
Introduction (2/2)
  • Most intrusions are not isolated
  • The early stages preparing for the later ones
  • The proposed approach correlates alerts using
    prerequisites of intrusions
  • Provide a high-level representation of correlated
    alerts
  • Reduce the impact of false alerts
  • Can be extended to predict attacks in progress

5
Related Work (1/2)
  • Alert correlation techniques
  • Probabilistic method
  • Correlate alerts using similarity between their
    features
  • Depends on parameters selected by human experts
  • Not suitable for fully discovering causal
    relationships between alerts

6
Related Work (2/2)
  • Consequence mechanism
  • Specify what types of alerts may follow a given
    alert type
  • Do not provide sufficient information to
    correlate all possibly related alerts
  • Machine learning techniques
  • Training data sets embedded with known intrusion
    scenarios
  • May overfit the training data, thereby missing
    attack scenarios not seen in the training data
    sets

7
Outline
  • Introduction
  • Related Work
  • Correlating Alerts Using Prerequisites of Attacks
  • Experimental Results
  • Discussion
  • Conclusion and Future Work

8
Correlating Alerts Using Prerequisites of Attacks
  • In series of attacks, the component attacks are
    usually not isolated
  • We correlate alerts by matching the consequences
    of some previous alerts and the prerequisites of
    some later ones

9
Prerequisite and Consequence of Attacks
  • Use predicates as a basic constructs to represent
    them
  • UDPVulnerableToBOF(VictimIP, VictimPort)
  • UDPVulnerableToBOF(VictimIP, VictimPort) AND
    UDPAccessibleViaFirewall(VictimIP, VictimPort)
  • GainRootAccess(VictimIP), rhostModified(VictimIP)

10
Hyper-alert Type and Hyper-alert (1/4)
Definition 1 A hyper-alert type T is a triple
(fact, prerequisite, consequence), where (1) fact
is a set of attribute names, each with an
associated domain of values, (2) prerequisite is
a logical formula whose free variables are all in
fact, and (3) consequence is a set of logical
formulas such that all the free variables in
consequence are in fact.
  • a hyper-alert type
  • SadmindBufferOverflow (fact, prerequisite,
    consequence)
  • for such attacks, where
  • fact VictimIP, VictimPort
  • prerequisite ExistHost (VictimIP) AND
    VulnerableSadmind (VictimIP)
  • consequence GainRootAccess(VictimIP)

11
Hyper-alert Type and Hyper-alert (2/4)
Definition 2 Given a hyper-alert type T (fact,
prerequisite, consequence), a hyper-alert
(instance) h of type T is a finite set of tuples
on fact, where each tuple is associated with an
interval-based timestamp begin time, end time.
The hyper-alert h implies that prerequisite must
evaluate to True and all the logical formulas in
consequence might evaluate to True for each of
the tuples.
Hyper alert hSadmindBOF (VictimIP
152.141.129.5, VictimPort 1235), (VictimIP
152.141.129.37, VictimPort 1235)
Prerequisites of the attack ExistHost
(152.141.129.5) AND VulnerableSadmind
(152.141.129.5), ExistHost (152.141.129.37) AND
VulnerableSadmind (152.141.129.37) Possible
consequences of the attack GainRootAccess(152.141
.129.5), GainRootAccess (152.141.129.37)
12
Hyper-alert Type and Hyper-alert (3/4)
Definition 3 Prerequisite set P(hSadmindBOF )
ExistHost (152.141.129.5), ExistHost
(152.141.129.37), VulnerableSadmind (152.141.129.5
), VulnerableSadmind (152.141.129.37) Consequenc
e set C(hSadmindBOF ) GainRootAccess
(152.141.129.5), GainRootAccess (152.141.129.37)
13
Hyper-alert Type and Hyper-alert (4/4)
Definition 4 Hyper-alert h1 prepares for
hyper-alert h2, if there exist p P(h2) and C
C(h1) such that for all c C, c.end time lt
p.begin time and the conjunction of all the
logical formulas in C implies p.
14
Hyper-alert Correlation Graph (1/5)
Definition 7 A hyper-alert correlation graph CG
(N, E) is a connected graph, where the set N of
nodes is a set of hyper-alerts, and for each pair
of nodes n1 n2 N, there is an edge from n1 to
n2 in E if and only if n1 prepares for n2.
15
Hyper-alert Correlation Graph (2/5)
Definition 8 Given a hyper-alert correlation
graph CG (N, E) and a hyper-alert n in N,
precedent (n, CG) is an operation that returns
the maximum sub-graph PG (N, E) of CG that
satisfies the following conditions (1) n N,
(2) for each n N other than n, there is a
directed path from n to n, and (3) each edge e
E is in a path from a node n in N to n. The
resulting graph PG is called the precedent graph
of n w.r.t. CG.
16
Hyper-alert Correlation Graph (3/5)
Definition 9 Given a hyper-alert correlation
graph CG (N, E) and a hyper-alert n in N,
subsequent (n, CG) is an operation that returns
the maximum sub-graph PG (N, E) of CG that
satisfies the following conditions (1) n N,
(2) for each n N other than n, there is a
directed path from n to n, and (3) each edge e
E is in a path from n to a node n in N. The
resulting graph PG is called the subsequent graph
of n w.r.t. CG.
17
Hyper-alert Correlation Graph (4/5)
Definition 10 Given a hyper-alert correlation
graph CG (N, E) and a hyper-alert n in N,
correlated (n, CG) is an operation that returns
the maximum sub-graph PG (N, E) of CG that
satisfies the following conditions (1) n N,
(2) for each n N other than n, there is
either a path from n to n, or a path from n to
n, and (3) each edge e E is either in a path
from a node in N to n, or in a path from n to a
node in N. The resulting graph PG is called the
correlated graph of n w.r.t. CG.
18
Hyper-alert Correlation Graph (5/5)
  • Advantages
  • Better understanding of the attackers intention
  • Identify on-going attacks
  • Take appropriate actions

19
Advantages of our Approach
  • Provides a high-level representation of detected
    attacks
  • Reduce the impact caused by false alerts
  • Can be extended to predict attacks in progress

20
Outline
  • Introduction
  • Related Work
  • Correlating Alerts Using Prerequisites of Attacks
  • Experimental Results
  • Discussion
  • Conclusion and Future Work

21
Experimental Results (1/3)
  • Data
  • Two DARPA 2000 intrusion detection evaluation
    datasets
  • DDOS attacks

22
Experimental Results (2/3)
23
Experimental Results (3/3)
24
Outline
  • Introduction
  • Related Work
  • Correlating Alerts Using Prerequisites of Attacks
  • Experimental Results
  • Discussion
  • Conclusion and Future Work

25
Systematic Development of Predicates and
Hyper-alert Types (1/3)
  • Predicates can be represented in different
    granularities

UDPVulnerableToBOF (VictimIP, VictimPort)
SadMindVulnerableToBOF (VictimIP, VictimPort)
SadMindVulnerableToBOFType123 (VictimIP,
VictimPort)
26
Systematic Development of Predicates and
Hyper-alert Types (2/3)
  • Each hyper-alert type corresponds to a class of
    hyper-alerts that share the same prerequisites
    and consequences.
  • Authors use the classification of intrusions
    proposed by Lindqvist and Jonsson in 1997 to
    develop predicates and Hyper-alert types

27
Systematic Development of Predicates and
Hyper-alert Types (3/3)
28
Generation of Hyper-alerts
  • Challenges
  • Variety of the existing IDSs
  • Different granularities and formats
  • Alerts reported by IDSs usually correspond to
    low-level attacks
  • Solution
  • Standards such as Intrusion Detection Message
    Exchange Format (IDMEF)
  • Allow hyper-alert aggregation

29
Processing of Hyper-alerts
  • Two approaches
  • Hyper-alert type information
  • Prepare-for relationship
  • In-memory database query optimization techniques
  • In-memory hybrid hash join
  • T-Tree

30
Limitations
  • Depends on the underlying IDSs
  • Not effective to alerts between which there is no
    prepare-for relationship
  • Smurf
  • SYN flooding

31
Outline
  • Introduction
  • Related Work
  • Correlating Alerts Using Prerequisites of Attacks
  • Experimental Results
  • Discussion
  • Conclusion and Future Work

32
Conclusion
  • Component attacks were usually not isolated
  • This paper proposed a formal framework to
    represent and correlate hyper-alerts
  • An intuitive representation of correlated alerts
  • Experiment shows the potential in reducing false
    alerts and uncovering high-level attack strategies

33
Future work
  • Ways to generate hyper-alerts
  • Develop on-line algorithms
  • Effectiveness of the approach
Write a Comment
User Comments (0)
About PowerShow.com