Log Correlation for Intrusion Detection: A Proof of Concept

  • Authors:
  • Cristina Abad;Jed Taylor;Cigdem Sengul;William Yurcik;Yuanyuan Zhou;Ken Rowe

  • Affiliations:
  • -;-;-;-;-;-

  • Venue:
  • ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intrusion detection is an important part of networked-systems security protection. Although commercial productsexist, finding intrusions has proven to be a difficult task withlimitations under current techniques. Therefore, improvedtechniques are needed. We argue the need for correlatingdata among different logs to improve intrusion detectionsystems accuracy. We show how different attacks are reflected in different logs and argue that some attacks are notevident when a single log is analyzed. We present experimental results using anomaly detection for the virus Yaha.Through the use of data mining tools (RIPPER) and correlation among logs we improve the effectiveness of an intrusion detection system while reducing false positives.