Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports...

41
Intrusion Alert Correlation by Norazah Aziz (GCIA) Cyberspace Security Lab, MIMOS Berhad

Transcript of Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports...

Page 1: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

Intrusion Alert Correlationby Norazah Aziz (GCIA)Cyberspace Security Lab, MIMOS Berhad

Page 2: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

2

Outline

• Why Correlation?

• Correlation Process

• Correlation Techniques

• Conclusion

Page 3: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

3

Terminologies

• Correlation

– The degree to which or more attributes or measurements on the same group of elements show a tendency to vary together. Source: http://dictionary.reference.com/browse/correlation

• Event

– Low level entity that analyzed by IDS eg: Network packets

• Alert

– Generated by IDS to notify of the interesting events.

• Alert Correlation

– Multi step process that receives alerts from one or more intrusion detection systems as input and produces a high-level description of the malicious activity on the network.

Page 4: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

4

Outline

• Why Correlation?

• Correlation Process

• Correlation Techniques

• Conclusion

• Q&A

Page 5: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

5

Correlation can address some if the IDS

weaknesses

• Alert Flooding

– generate a large amount of alerts

• Context

– not group related alerts

• False Alert

– generate a false negative and false positive

• Scalability

– difficult to achieve large-scale deployment

Page 6: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

6

With correlation..

• Can capture a high level view of the attack

activity on the target network without losing

security-relevant information.

Page 7: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

7

Outline

• Why Correlation?

• Correlation Process

• Correlation Techniques

• Conclusion

• Q&A

Page 8: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

8

Main correlation process

• Alert Collection

• Alert Aggregation and Verification

• High Level Alert Structures

Page 9: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

9

Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification

Thread

Reconstruction

Attack Session

Reconstruction

Focus

Recognition

Multi-Step

Correlation

Impact

AnalysisPrioritizationIntrusion Reports

Sensor

Ontology

Databases

Asset

Database

Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.

Alert Collection Alert Aggregation & Verification

High-Level Alert Structures

Correlation Process

Page 10: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

10

Attack Scenario Example

10.1.9.2, Linux

Running Apache

Running Application Log IDS (APPL)

INTERNET

Attacker

67.6.1.0

Switch

NIDS1

NIDS2

HIDS

Portscan

Worm exploit Mic.IIS

Failed

Apache Buffer Overflow Exploit

Local exploit against linuxconf

Page 11: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

11

HIDS

HIDS

APPL

NIDS1

NIDS1

NIDS1

NIDS2

Sensor

10.1.9.2,

port:80

20.9.0.111:5/11:5IIS Exploit3

linuxconf21:4/21:4Local Exploit7

linuxconf21:3/21:3Local Exploit6

Localhost,

Apache

19:1/19:1Bad Request5

10.1.9.2

port:80

67.6.1.019:0/19:0Apache Exploit4

10.1.9.267.6.1.009:0/14:1Portscan2

10.1.9.267.6.1.009:1/13:9Scanning1

TagDest IPsSrc IPsStart/EndSignatureID

Attack Scenario Alerts

Page 12: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

12

Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification

Thread

Reconstruction

Attack Session

Reconstruction

Focus

Recognition

Multi-Step

Correlation

Impact

AnalysisPrioritizationIntrusion Reports

Sensor

Ontology

Databases

Asset

Database

Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.

Alert Collection Alert Aggregation & Verification

High-Level Alert Structures

Alert Normalization

Page 13: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

13

Alert Normalization

HIDS

HIDS

APPL

NIDS1

NIDS1

NIDS1

NIDS2

Sensor

10.1.9.2, port:8020.9.0.111:5/11:5IIS Exploit3

linuxconf21:4/21:4Local Exploit7

linuxconf21:3/21:3Local Exploit6

Localhost,

Apache

19:1/19:1Bad Request5

10.1.9.2 port:8067.6.1.019:0/19:0Apache Exploit4

10.1.9.267.6.1.009:0/14:1Portscan2

10.1.9.267.6.1.009:1/13:9Scanning1

TagDest IPsSrc IPsStart/EndSignatureID

NIDS1

NIDS2

Sensor

10.1.9.267.6.1.009:0/14:1Portscan2

10.1.9.267.6.1.009:1/13:9Portscan1

TagDest IPsSrc IPsStart/EndSignatureID

Standardize the alert messages in different

formats using CVE (Common

Vulnerabilities and Exposures)

Page 14: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

14

Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification

Thread

Reconstruction

Attack Session

Reconstruction

Focus

Recognition

Multi-Step

Correlation

Impact

AnalysisPrioritizationIntrusion Reports

Sensor

Ontology

Databases

Asset

Database

Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.

Alert Collection Alert Aggregation & Verification

High-Level Alert Structures

Alert Preprocessing

Page 15: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

15

Alert Preprocessing

HIDS

HIDS

APPL

NIDS1

NIDS1

NIDS1

NIDS2

Sensor

10.1.9.2, port:8020.9.0.111:5/11:5IIS Exploit3

linuxconf21:4/21:4Local Exploit7

linuxconf21:3/21:3Local Exploit6

Localhost, Apache19:1/19:1Bad Request5

10.1.9.2 port:8067.6.1.019:0/19:0Apache Exploit4

10.1.9.267.6.1.009:0/14:1Portscan2

10.1.9.267.6.1.009:1/13:9Portscan1

TagDest IPsSrc IPsStart/EndSignatureID

HIDS10.1.9.2, linuxconf10.1.9.221:4/21:4Local Exploit7

HIDS

APPL

Sensor

10.1.9.2, linuxconf10.1.9.221:3/21:3Local Exploit6

10.1.9.2, Apache10.1.9.219:1/19:1Bad Request5

TagDest IPsSrc IPsStart/EndSignatureID

Supply best-effort values information by

determine the alert’s source and target

Page 16: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

16

Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification

Thread

Reconstruction

Attack Session

Reconstruction

Focus

Recognition

Multi-Step

Correlation

Impact

AnalysisPrioritizationIntrusion Reports

Sensor

Ontology

Databases

Asset

Database

Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.

Alert Collection Alert Aggregation & Verification

High-Level Alert Structures

Alert Fusion

Page 17: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

17

Alert Fusion

HIDS

HIDS

APPL

NIDS1

NIDS1

NIDS1

NIDS2

Sensor

10.1.9.2, port:8020.9.0.111:5/11:5IIS Exploit3

10.1.9.2, linuxconf10.1.9.221:4/21:4Local Exploit7

10.1.9.2, linuxconf10.1.9.221:3/21:3Local Exploit6

10.1.9.2, Apache10.1.9.219:1/19:1Bad Request5

10.1.9.2 port:8067.6.1.019:0/19:0Apache Exploit4

10.1.9.267.6.1.009:0/14:1Portscan2

10.1.9.267.6.1.009:1/13:9Portscan1

TagDest IPsSrc IPsStart/EndSignatureID

{NIDS1,NIDS2}

HIDS

Sensor

{1,2}10.1.9.267.6.1.009:0/13:9Meta-Alert-8

10.1.9.2, linuxconf10.1.9.221:4/21:4Local Exploit7

TagDest IPsSrc IPsStart/EndSignatureID

Identifies alerts that refer to the same

underlying event

Page 18: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

18

Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification

Thread

Reconstruction

Attack Session

Reconstruction

Focus

Recognition

Multi-Step

Correlation

Impact

AnalysisPrioritizationIntrusion Reports

Sensor

Ontology

Databases

Asset

Database

Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.

Alert Collection Alert Aggregation & Verification

High-Level Alert Structures

Alert Verification

Page 19: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

19

Alert Verification

{1,2}{NIDS1,NIDS2}10.1.9.267.6.1.009:0/13:9Meta-Alert-8

HIDS

HIDS

APPL

NIDS1

NIDS1

NIDS1

NIDS2

Sensor

10.1.9.2, port:8020.9.0.111:5/11:5IIS Exploit3

10.1.9.2, linuxconf10.1.9.221:4/21:4Local Exploit7

10.1.9.2, linuxconf10.1.9.221:3/21:3Local Exploit6

10.1.9.2, Apache10.1.9.219:1/19:1Bad Request5

10.1.9.2 port:8067.6.1.019:0/19:0Apache Exploit4

10.1.9.267.6.1.009:0/14:1Portscan2

10.1.9.267.6.1.009:1/13:9Portscan1

TagDest IPsSrc IPsStart/EndSignatureID

NIDS1

NIDS1

Sensor

10.1.9.2 port:8067.6.1.019:0/19:0Apache Exploit4

Irrelevant10.1.9.2, port:8020.9.0.111:5/11:5IIS Exploit3

TagDest IPsSrc IPsStart/EndSignatureID

Remove or ignore the irrelevant alerts,

e.g. unsuccessful alert

Page 20: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

20

Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification

Thread

Reconstruction

Attack Session

Reconstruction

Focus

Recognition

Multi-Step

Correlation

Impact

AnalysisPrioritizationIntrusion Reports

Sensor

Ontology

Databases

Asset

Database

Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.

Alert Collection Alert Aggregation & Verification

High-Level Alert Structures

Attack Thread Reconstruction

Page 21: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

21

Thread Reconstruction

{6,7}HIDS10.1.9.2, linuxconf10.1.9.221:3/21:4Meta-Alert10

{4,8} {NIDS1,NIDS2}10.1.9.2, port:8067.6.1.009:0/19:0Meta-Alert9

{1,2}

correlated

{NIDS1,NIDS2}10.1.9.267.6.1.009:0/13:9Meta-Alert8

HIDS

HIDS

APPL

NIDS1

NIDS1

NIDS1

NIDS2

Sensor

irrelevant10.1.9.2, port:8020.9.0.111:5/11:5IIS Exploit3

correlated10.1.9.2, linuxconf10.1.9.221:4/21:4Local Exploit7

correlated10.1.9.2, linuxconf10.1.9.221:3/21:3Local Exploit6

10.1.9.2, Apache10.1.9.219:1/19:1Bad Request5

correlated10.1.9.2, port:8067.6.1.019:0/19:0Apache Exploit4

10.1.9.267.6.1.009:0/14:1Portscan2

10.1.9.267.6.1.009:1/13:9Portscan1

TagDest IPsSrc IPsStart/EndSignatureID

Combines a series of alerts that refer to attacks

launched by one attacker against a single target.

Page 22: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

22

Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification

Thread

Reconstruction

Attack Session

Reconstruction

Focus

Recognition

Multi-Step

Correlation

Impact

AnalysisPrioritizationIntrusion Reports

Sensor

Ontology

Databases

Asset

Database

Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.

Alert Collection Alert Aggregation & Verification

High-Level Alert Structures

Attack Session Reconstruction

Page 23: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

23

Session Reconstruction

{5,9}{NIDS1,NIDS2,

APPL}

10.1.9.2, port:80,

Apache

{67.6.1.0

,10.1.9.2}

09:0/19:1Meta-Alert11

{6,7}HIDS10.1.9.2, linuxconf10.1.9.221:3/21:4Meta-Alert10

{4,8} {NIDS1,NIDS2}10.1.9.2, port:8067.6.1.009:0/19:0Meta-Alert9

{1,2}

correlated

{NIDS1,NIDS2}10.1.9.267.6.1.009:0/13:9Meta-Alert8

HIDS

HIDS

APPL

NIDS1

NIDS1

NIDS1

NIDS2

Sensor

irrelevant10.1.9.2, port:8020.9.0.111:5/11:5IIS Exploit3

correlated10.1.9.2, linuxconf10.1.9.221:4/21:4Local Exploit7

correlated10.1.9.2, linuxconf10.1.9.221:3/21:3Local Exploit6

10.1.9.2, Apache10.1.9.219:1/19:1Bad Request5

correlated10.1.9.2, port:8067.6.1.019:0/19:0Apache Exploit4

10.1.9.267.6.1.009:0/14:1Portscan2

10.1.9.267.6.1.009:1/13:9Portscan1

TagDest IPsSrc IPsStart/EndSignatureID

Linking network-based to host-based alerts

Page 24: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

24

Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification

Thread

Reconstruction

Attack Session

Reconstruction

Focus

Recognition

Multi-Step

Correlation

Impact

AnalysisPrioritizationIntrusion Reports

Sensor

Ontology

Databases

Asset

Database

Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.

Alert Collection Alert Aggregation & Verification

High-Level Alert Structures

Attack Focus Recognition

Page 25: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

25

Attack Focus Recognition

• To identify hosts that are either source or the

target of a substantial amount of attacks.

• Effective in reducing the number of alerts

caused by DDoS and portscan activity.

• Example: Several portscan alerts against

multiple targets from the same source, alerts

would be merged into a one2many meta-alert.

Page 26: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

26

Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification

Thread

Reconstruction

Attack Session

Reconstruction

Focus

Recognition

Multi-Step

Correlation

Impact

AnalysisPrioritizationIntrusion Reports

Sensor

Ontology

Databases

Asset

Database

Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.

Alert Collection Alert Aggregation & Verification

High-Level Alert Structures

Multi Step Correlation

Page 27: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

27

Multistep Correlation

{10,11}{NIDS1,NIDS2,APPL,HIDS}

10.1.9.2, port:80, Apache, linuxconf

{67.6.1.0 ,10.1.9.2}

09:0/21:4Meta-Alert12

{5,9} correlated

{NIDS1,NIDS2,APPL}

10.1.9.2, port:80, Apache

{67.6.1.0 ,10.1.9.2}

09:0/19:1Meta-Alert11

{6,7} correlated

HIDS10.1.9.2, linuxconf10.1.9.221:3/21:4Meta-Alert10

{4,8} {NIDS1,NIDS2}10.1.9.2, port:8067.6.1.009:0/19:0Meta-Alert9

{1,2} correlated

{NIDS1,NIDS2}10.1.9.267.6.1.009:0/13:9Meta-Alert8

HIDS

HIDS

APPL

NIDS1

NIDS1

NIDS1

NIDS2

Sensor

irrelevant10.1.9.2, port:8020.9.0.111:5/11:5IIS Exploit3

correlated10.1.9.2, linuxconf10.1.9.221:4/21:4Local Exploit7

correlated10.1.9.2, linuxconf10.1.9.221:3/21:3Local Exploit6

10.1.9.2, Apache10.1.9.219:1/19:1Bad Request5

correlated10.1.9.2, port:8067.6.1.019:0/19:0Apache Exploit4

10.1.9.267.6.1.009:0/14:1Portscan2

10.1.9.267.6.1.009:1/13:9Portscan1

TagDest IPsSrc IPsStart/EndSignatureID

Defined by using some form of expert knowledge (attack scenario)

Page 28: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

28

Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification

Thread

Reconstruction

Attack Session

Reconstruction

Focus

Recognition

Multi-Step

Correlation

Impact

AnalysisPrioritizationIntrusion Reports

Sensor

Ontology

Databases

Asset

Database

Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.

Alert Collection Alert Aggregation & Verification

High-Level Alert Structures

Impact Analysis

Page 29: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

29

Impact Analysis

• To analyze alerts with regard to their impact on

the network infrastructure and the attached

resources.

• Example:

– Dependency between mail services that

requires an operational domain name service

(DNS) to work properly.

Page 30: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

30

Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification

Thread

Reconstruction

Attack Session

Reconstruction

Focus

Recognition

Multi-Step

Correlation

Impact

AnalysisPrioritizationIntrusion Reports

Sensor

Ontology

Databases

Asset

Database

Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.

Alert Collection Alert Aggregation & Verification

High-Level Alert Structures

Alert Prioritization

Page 31: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

31

Prioritization

{11,10}HIGHMultistep Attack ScenarioMeta-Alert12

{9,5}correlatedLOWRemote Attack SessionMeta-Alert11

{6,7}correlatedLOWLocal Attack ThreadMeta-Alert10

{8,4}correlatedLOWRemote Attack ThreadMeta-Alert9

{2,3}correlatedLOWFused PortscanMeta-Alert8

correlated

correlated

correlated

correlated

Irrelevant

correlated

correlated

Tag

LOWIIS Exploit3

LOWLocal Exploit7

LOWLocal Exploit6

LOWBad Request5

LOWApache Exploit4

LOWPortscan2

LOWPortscan1

Ref TagPriorityDescriptionSignatureID

To define appropriate priorities related to the attack’s impact and the

effect of a response by classify alerts (high, medium or low)

Page 32: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

32

Outline

• Why Correlation?

• Correlation Process

• Correlation Techniques

• Conclusion

• Q&A

Page 33: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

33

Correlation Techniques

• Similar Attack Attributes

• Pre-defined Attack Scenarios

• Pre & Post Condition of Individual Attack

• Statistical Causality Analysis

Page 34: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

34

Technique 1: Similar Attack Attributes

• Alerts belonging to the same attack often have similar

attributes

• To recognize correlation – inspect alert attributes and

finding similarities between them

• Well-founded list of alert attributes such as sensor, alert

thread, source and destination IPs, ports and time.

• Emerald system is an example of such implementation

Page 35: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

35

Technique 2: Pre-defined Attack Scenarios

• Process of filling in attack scenarios templates and

formulate them.

• Attack scenarios are broken down to explicit correlation

rules.

• Restricted to known attacks and misuse detection only

• Specified by human users or learned through training

datasets

• Example of implementation : Attack Specification

Language (ASL)

Page 36: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

36

Technique 3: Pre & Post Condition of

Individual Attack

• Powerful mechanism of expressing correlation

criteria

• Based on the preconditions and consequences

of individual attacks; correlates alerts if the pre-

condition of some later alerts are satisfied by the

consequences of some earlier alerts.

• Uncover the causal relationship between alerts,

and is not restricted to known attack scenarios.

Page 37: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

37

Technique 4: Statistical Causality Analysis

• Misuse detection toward anomaly detection

• Not feasible solution for the complete correlation

process

• But it can be utilized as a part of a larger system

to pre-process alerts or to provide meta-alert

signatures.

• Example of implementation: Granger Causality

Test (GCT)

Page 38: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

38

Outline

• Why Correlation?

• Correlation Process

• Correlation Techniques

• Conclusion

• Q&A

Page 39: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

39

Conclusion

• IDS is still needed and the correlation is the

effective means to analyze the alert to high level

view picture.

• Research on better correlation with detectable

unknown attack need to be done.

Page 40: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

40

References

• Christopher Kruegel, Fredrik Valeur, Giovanni Vigna (2005). Intrusion Detection and Correlation, Challenges and Solution, Springer Science+Business Media Inc, USA.

• Antti Hatala, et al, “Event Data Exchange and Intrusion Alert Correlation in Heterogeneous Networks”, Proceeding of the 8th Collogquium for Information Systems Security Education West Point, NY, June 2004

• Xinzhou Qin, et al, “Statistical Causality of INFOSEC Alert Data”; in Proceedings of Recent Advances in Intrusion Detection 2003.

• Hervé Debar and Andreas Wespi: “Aggregation and correlation of Intrusion-Detection Alerts”; in Proceedings of Recent Advances in Intrusion Detection 2001.

• Peng Ning , et al, “Constructing attack scenarios through correlation of intrusion alerts”; in Proceedings of the 9th ACM conference on Computer and Communications security; 2002.

• Hervé Debar and Andreas Wespi: “Aggregation and correlation of Intrusion-Detection Alerts”; in Proceedings of Recent Advances in Intrusion Detection 2001.

Page 41: Intrusion Alert Correlation - skmm.gov.my · Correlation Impact Analysis Intrusion Reports Prioritization Sensor Ontology Databases Asset Database Sources: Kruegel et.al, Intrusion

41

Thank You