Alert Correlation Algorithms: A Survey and Taxonomy

11/02/2018
by   Seyed Ali Mirheidari, et al.
0

Alert correlation is a system which receives alerts from heterogeneous Intrusion Detection Systems and reduces false alerts, detects high level patterns of attacks, increases the meaning of occurred incidents, predicts the future states of attacks, and detects root cause of attacks. To reach these goals, many algorithms have been introduced in the world with many advantages and disadvantages. In this paper, we are trying to present a comprehensive survey on already proposed alert correlation algorithms. The approach of this survey is mainly focused on algorithms in correlation engines which can work in enterprise and practical networks. Having this aim in mind, many features related to accuracy, functionality, and computation power are introduced and all algorithm categories are assessed with these features. The result of this survey shows that each category of algorithms has its own strengths and an ideal correlation frameworks should be carried the strength feature of each category.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/16/2009

An Immune Inspired Network Intrusion Detection System Utilising Correlation Context

Network Intrusion Detection Systems (NIDS) are computer systems which mo...
research
03/05/2010

Integrating Innate and Adaptive Immunity for Intrusion Detection

Network Intrusion Detection Systems (NDIS) monitor a network with the ai...
research
06/09/2018

Application of Correlation Indices on Intrusion Detection Systems: Protecting the Power Grid Against Coordinated Attacks

The future power grid will be characterized by the pervasive use of hete...
research
09/18/2023

GCNIDS: GCN-based intrusion detection system for CAN Bus

The Controller Area Network (CAN) bus serves as a standard protocol for ...
research
04/23/2010

Real-Time Alert Correlation with Type Graphs

The premise of automated alert correlation is to accept that false alert...
research
01/20/2022

NLP Methods in Host-based Intrusion Detection Systems: A Systematic Review and Future Directions

The Host-Based Intrusion Detection Systems (HIDS) are widely used for de...

Please sign up or login with your details

Forgot password? Click here to reset