Alert prioritization in Intrusion Detection Systems

Khalid Alsubhi*, Ehab Al-Shaer, Raouf Boutaba

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

49 Scopus citations

Abstract

Intrusion Detection Systems (IDSs) are designed to monitor user and/or network activity and generate alerts whenever abnormal activities are detected. The number of these alerts can be very large; making the task of security analysts difficult to manage. Furthermore, IDS alert management techniques, such as clustering and correlation, suffer from involving unrelated alerts in their processes and consequently provide imprecise results. In this paper, we propose a fuzzy-logic based technique for scoring and prioritizing alerts generated by an IDS(1). In addition, we present an alert rescoring technique that leads to a further reduction of the number of alerts. The approach is validated using the 2000 DARPA intrusion detection scenario specific datasets and comparative results between the Snort IDS alert scoring and our scoring and prioritization scheme are presented.

Original languageEnglish
Title of host publicationNOMS 2008 - IEEE/IFIP Network Operations and Management Symposium
Subtitle of host publicationPervasive Management for Ubiquitous Networks and Services
Pages33-40
Number of pages8
DOIs
StatePublished - 2008
Externally publishedYes
EventNOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services - Salvador - Bahia, Brazil
Duration: 7 Apr 200811 Apr 2008

Publication series

NameNOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services

Conference

ConferenceNOMS 2008 - IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services
Country/TerritoryBrazil
CitySalvador - Bahia
Period7/04/0811/04/08

Keywords

  • Alert management
  • Alert prioritization

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'Alert prioritization in Intrusion Detection Systems'. Together they form a unique fingerprint.

Cite this