Using data correlation to build an intrusion detection system

  • Authors:
  • L. Romano;V. Vianello;S. D'antonio;S. Giordano

  • Affiliations:
  • Dipt per le Tech, Univ degli Studi di Napoli "Parthenope", Centro Direzionale di Napoli and Lab. ITeM "Carlo Savy", CINI and Istituto di Calcolo e Reti ad Alte Prestazioni, ICAR-CNR, Napoli, Italy;Dipt per le Tech, Univ degli Studi di Napoli "Parthenope", Centro Direzionale di Napoli, Napoli, Italy and Lab. ITeM "Carlo Savy", Consorzio Interuniversitario Nazionale per l'Informatica, Napoli, ...;Dipt per le Tech, Univ degli Studi di Napoli "Parthenope", Centro Direzionale di Napoli, Napoli, Italy and Lab. ITeM "Carlo Savy", Consorzio Interuniversitario Nazionale per l'Informatica, Napoli, ...;Dipt per le Tech, Univ degli Studi di Napoli "Parthenope", Centro Direzionale di Napoli, Napoli, Italy and Lab. ITeM "Carlo Savy", Consorzio Interuniversitario Nazionale per l'Informatica, Napoli, ...

  • Venue:
  • ICAI'09 Proceedings of the 10th WSEAS international conference on Automation & information
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intrusion Detection Systems (IDSs) are one of the most adopted technologies when facing the issue of computer security. Regrettably, current solutions are far from perfect: i) either they produce a large number of false positives or they detect only known attacks; ii) they do not scale as the monitored infrastructure grows in terms of number of components and of exchanged data. Correlation of attack symptoms from diverse information sources has been proven to be an effective approach. In this paper, we propose an IDS solution which correlates information from diverse sources for improved performance, i.e. achieving high detection while reducing false positives. We discuss the key issues that result from adopting correlation of data coming from multiple sources and present the conceptual architecture that has been drown in the PHDS ("A Middleware Infrastructure for Real-Time Processing of Heterogeneous Data Streams") project to face such issues in a Security and Safety domain. We also present technological choices taken to implement such an architecture.