Research Article

Methods for post-processing of alerts in intrusion detection: A survey

Volume: 2 Number: 2 June 28, 2013
  • Georgios Spathoulas
  • Sokratis Katsikas
TR EN

Methods for post-processing of alerts in intrusion detection: A survey

Abstract

Intrusion detection is an important protection tool for computer systems and networks. In recent years it has become an essential piece in the IT security infrastructure of large organizations. Even though intrusion detection systems are installed in an increasing rate, they are often misused as the quality of alerts they produce is not satisfactory. High alert volume, high false positives rate and low level of information are the main reasons that security analysts cannot take full advantage of intrusion detection alert-sets. The aim of this survey is to summarize intrusion detection alerts' post-processing research, which is categorized in false positives reduction, alerts' correlation and visualisation. The most important efforts in the field are analyzed, while all recent methods are presented. Finally the present and the future of alerts post-processing research field is discussed.

Keywords

References

  1. A. Valdes and K. Skinner, “Probabilistic alert correlation,” in Recent Advances in Intrusion Detection (RAID 2001), ser. Lecture Notes in Computer Science, no. 2212. Springer-Verlag, 2001.
  2. H. Ren, N. Stakhanova, and A. Ghorbani, “An online adaptive approach to alert correlation,” in Detection of Intrusions and Malware, and Vulnerability Assessment, ser. Lecture Notes in Computer Science, C. Kreibich and M. Jahnke, Eds. Berlin Heidelberg, 2010, vol. 6201, pp. 153–172. Springer
  3. K. Julisch, “Clustering intrusion detection alarms to support root cause analysis,” ACM Trans. Inf. Syst. Secur., vol. 6, no. 4, pp. 443–471, Nov. 2003.
  4. S. Lee, B. Chung, H. Kim, Y. Lee, C. Park, and H. Yoon, “Real-time analysis of intrusion detection alerts via correlation,” Computers & Security, vol. 25, no. 3, pp. 169 – 183, 2006.
  5. H. Debar and A. Wespi, “Aggregation and correlation of intrusion-detection alerts,” in Proceedings of the 4th Interna- tional Symposium on Recent Advances in Intrusion Detection, ser. RAID ’00, 2001, pp. 85–103.
  6. P. Ning, Y. Cui, and D. S. Reeves, “Constructing attack sce- narios through correlation of intrusion alerts,” in Proceedings of the 9th ACM conference on Computer and communications security, ser. CCS ’02.
  7. ACM, 2002, pp. 245–254.
  8. X. Qin and W. Lee, “Attack plan recognition and prediction using causal networks,” in Computer Security Applications Conference, 2004. 20th Annual, 2004, pp. 370–379.

Details

Primary Language

English

Subjects

Applied Mathematics

Journal Section

Research Article

Authors

Georgios Spathoulas This is me

Sokratis Katsikas This is me

Publication Date

June 28, 2013

Submission Date

January 30, 2016

Acceptance Date

-

Published in Issue

Year 2013 Volume: 2 Number: 2

APA
Spathoulas, G., & Katsikas, S. (2013). Methods for post-processing of alerts in intrusion detection: A survey. International Journal of Information Security Science, 2(2), 64-80. https://izlik.org/JA82AW25MT
AMA
1.Spathoulas G, Katsikas S. Methods for post-processing of alerts in intrusion detection: A survey. IJISS. 2013;2(2):64-80. https://izlik.org/JA82AW25MT
Chicago
Spathoulas, Georgios, and Sokratis Katsikas. 2013. “Methods for Post-Processing of Alerts in Intrusion Detection: A Survey”. International Journal of Information Security Science 2 (2): 64-80. https://izlik.org/JA82AW25MT.
EndNote
Spathoulas G, Katsikas S (June 1, 2013) Methods for post-processing of alerts in intrusion detection: A survey. International Journal of Information Security Science 2 2 64–80.
IEEE
[1]G. Spathoulas and S. Katsikas, “Methods for post-processing of alerts in intrusion detection: A survey”, IJISS, vol. 2, no. 2, pp. 64–80, June 2013, [Online]. Available: https://izlik.org/JA82AW25MT
ISNAD
Spathoulas, Georgios - Katsikas, Sokratis. “Methods for Post-Processing of Alerts in Intrusion Detection: A Survey”. International Journal of Information Security Science 2/2 (June 1, 2013): 64-80. https://izlik.org/JA82AW25MT.
JAMA
1.Spathoulas G, Katsikas S. Methods for post-processing of alerts in intrusion detection: A survey. IJISS. 2013;2:64–80.
MLA
Spathoulas, Georgios, and Sokratis Katsikas. “Methods for Post-Processing of Alerts in Intrusion Detection: A Survey”. International Journal of Information Security Science, vol. 2, no. 2, June 2013, pp. 64-80, https://izlik.org/JA82AW25MT.
Vancouver
1.Georgios Spathoulas, Sokratis Katsikas. Methods for post-processing of alerts in intrusion detection: A survey. IJISS [Internet]. 2013 Jun. 1;2(2):64-80. Available from: https://izlik.org/JA82AW25MT