Home // ICCGI 2012, The Seventh International Multi-Conference on Computing in the Global Information Technology // View article


A Behavior-Based Method for Rationalizing the Amount of IDS Alert Data

Authors:
Teemu Alapaholuoma
Jussi Nieminen
Jorma Ylinen
Timo Seppälä
Pekka Loula

Keywords: Alert, Detection, Intrusion, Clustering, Snort

Abstract:
Intrusion detection systems typically rely on signatures. A signature describes a rule, which is realized as an alert whenever an IP packet matching the rule is observed in the network by an intrusion detection system. In the configuration phase of a signature based intrusion detection system, the operator usually activates the signatures considered interesting. Interesting typically refers to aberrant traffic and behavior in the network. The classification of signatures as interesting or uninteresting is typically based on prior knowledge about the characteristics of the monitored network. In this paper, we introduce a method based on network behavior for identifying, which alerts and signatures could be considered interesting. Based on the identification, only the signatures labeled as interesting should be activated, in order to rationalize the amount of alert data produced. The method is based on the K-means clustering of intrusion detection system alert data.

Pages: 302 to 307

Copyright: Copyright (c) IARIA, 2012

Publication date: June 24, 2012

Published in: conference

ISSN: 2308-4529

ISBN: 978-1-61208-202-8

Location: Venice, Italy

Dates: from June 24, 2012 to June 29, 2012