Processing intrusion detection alert aggregates with time series modeling

  • Authors:
  • Jouni Viinikka;Hervé Debar;Ludovic Mé;Anssi Lehikoinen;Mika Tarvainen

  • Affiliations:
  • France Telecom, BP 6243, FR-14066 Caen Cedex, France;France Telecom, BP 6243, FR-14066 Caen Cedex, France;Supélec, BP 81127, FR-35511 Cesson Sévigné Cedex, France;University of Kuopio, P.O. Box 1627, FIN-70211 Kuopio, Finland;University of Kuopio, P.O. Box 1627, FIN-70211 Kuopio, Finland

  • Venue:
  • Information Fusion
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The main use of intrusion detection systems (IDS) is to detect attacks against information systems and networks. Normal use of the network and its functioning can also be monitored with an IDS. It can be used to control, for example, the use of management and signaling protocols, or the network traffic related to some less critical aspects of system policies. These complementary usages can generate large numbers of alerts, but still, in operational environment, the collection of such data may be mandated by the security policy. Processing this type of alerts presents a different problem than correlating alerts directly related to attacks or filtering incorrectly issued alerts. We aggregate individual alerts to alert flows, and then process the flows instead of individual alerts for two reasons. First, this is necessary to cope with the large quantity of alerts - a common problem among all alert correlation approaches. Second, individual alert's relevancy is often indeterminable, but irrelevant alerts and interesting phenomena can be identified at the flow level. This is the particularity of the alerts created by the complementary uses of IDSes. Flows consisting of alerts related to normal system behavior can contain strong regularities. We propose to model these regularities using non-stationary autoregressive models. Once modeled, the regularities can be filtered out to relieve the security operator from manual analysis of true, but low impact alerts. We present experimental results using these models to process voluminous alert flows from an operational network.