Alarm clustering for intrusion detection systems in computer networks

  • Authors:
  • Giorgio Giacinto;Roberto Perdisci;Fabio Roli

  • Affiliations:
  • Department of Electrical and Electronic Engineering, University of Cagliari, Piazza D Armi, Cagliari, Italy;Department of Electrical and Electronic Engineering, University of Cagliari, Piazza D Armi, Cagliari, Italy;Department of Electrical and Electronic Engineering, University of Cagliari, Piazza D Armi, Cagliari, Italy

  • Venue:
  • MLDM'05 Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Until recently, network administrators manually arranged alarms produced by Intrusion Detection Systems (IDSs) to attain a high-level description of threats. As the number of alarms is increasingly growing, automatic tools for alarm clustering have been proposed to provide such a high level description of the attack scenario. In addition, it has been shown that effective threat analysis require the fusion of different sources of information, such as different IDSs, firewall logs, etc. In this paper, we propose a new strategy to perform alarm clustering which produces unified descriptions of attacks from multiple alarms. Tests have been performed on a live network where commercial and open-source IDSs analyzed network traffic.