Generation and assessment of correlation rules to detect complex attack scenarios

Erwan Godefroy, Eric Totel, Michel Hurfin, Frederic Majorczyk

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Information systems can be targeted by different types of attacks. Some of them are easily detected (like an DDOS targeting the system) while others are more stealthy and consist in successive attacks steps that compromise different parts of the targeted system. The alarm referring to detected attack steps are often hidden in a tremendous amount of notifications that include false alarms. Alert correlators use correlation rules (that can be explicit, implicit or semi-explicit [3]) in order to solve this problem by extracting complex relationships between the different generated events and alerts. On the other hand, providing maintainable, complete and accurate correlation rules specifically adapted to an information system is a very difficult work. We propose an approach that, given proper input information, can build a complete and system dependant set of correlation rules derived from a high level attack scenario. We then evaluate the applicability of this method by applying it to a real system and assessing the fault tolerance in a simulated environment in a second phase.

Original languageEnglish
Title of host publication2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages707-708
Number of pages2
ISBN (Electronic)9781467378765
DOIs
Publication statusPublished - 3 Dec 2015
Externally publishedYes
Event3rd IEEE International Conference on Communications and Network Security, CNS 2015 - Florence, Italy
Duration: 28 Sept 201530 Sept 2015

Publication series

Name2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015

Conference

Conference3rd IEEE International Conference on Communications and Network Security, CNS 2015
Country/TerritoryItaly
CityFlorence
Period28/09/1530/09/15

Keywords

  • Alert correlation
  • Intrusion detection
  • Security and protection

Fingerprint

Dive into the research topics of 'Generation and assessment of correlation rules to detect complex attack scenarios'. Together they form a unique fingerprint.

Cite this