首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于频繁模式挖掘的报警关联与分析算法
引用本文:董晓梅,于戈,孙晶茹,王丽娜.基于频繁模式挖掘的报警关联与分析算法[J].电子学报,2005,33(8):1356-1359.
作者姓名:董晓梅  于戈  孙晶茹  王丽娜
作者单位:东北大学信息科学与工程学院,辽宁沈阳,110004;东北大学信息科学与工程学院,辽宁沈阳,110004;武汉大学计算机学院,湖北武汉,430072
基金项目:国家高技术研究发展计划(863计划),国家自然科学基金,高等学校博士学科点专项科研项目,教育部优秀青年教师资助计划
摘    要:提出了一个入侵检测与响应协作模型,结合入侵容忍的思想扩展了入侵检测消息交换格式IDMEF,增加了怀疑度属性.除了发现的入侵事件外,一些可疑的事件也会报告给协作部件.提出了一个基于修改的CLOSET频繁闭模式挖掘算法的报警关联与分析算法,在分布式入侵检测与响应协作系统中,帮助协作部件对收到的IDMEF格式的报警消息进行关联和分析,以便做出合适的响应.为此,修改了CLOSET算法来按照最小支持度和最小怀疑度来得到频繁闭模式.实验结果表明,应用该算法可以很好地缩减报警数量,同时对于所有可疑的和入侵事件,都可以做出适宜的响应.

关 键 词:入侵检测  协作  报警  入侵容忍  频繁模式
文章编号:0372-2112(2005)08-1356-04
收稿时间:2003-09-23
修稿时间:2003-09-232005-05-01

An Alert Correlation and Analysis Algorithm Based on Frequent Pattern Mining
DONG Xiao-mei,YU Ge,SUN Jing-ru,WANG Li-na.An Alert Correlation and Analysis Algorithm Based on Frequent Pattern Mining[J].Acta Electronica Sinica,2005,33(8):1356-1359.
Authors:DONG Xiao-mei  YU Ge  SUN Jing-ru  WANG Li-na
Institution:1. School of Information Science and Engineering,Northeastern University,Shenyang,Liaoning 110004,China;2. School of Computer Science and Technology, Wuhan University,Wuhan,Hubei 430072,China
Abstract:An intrusion detection and response cooperation model was proposed.Incorporating the intrusion tolerance idea,the Intrusion Detection Message Exchange Format (IDMEF) was extended and a suspicious degree attribute was added.So suspicious events as well as intrusions can be reported to the cooperation components.An alert correlation and analysis algorithm was proposed,which was based on the modified CLOSET frequent close pattern mining algorithm.The algorithm can help the cooperation components in a distributed intrusion detection and response cooperation system to correlate and analyze the alerts received to make appropriate responses.To meet this purpose,the CLOSET algorithm was modified to obtain frequent close patterns according to a minimum support and a minimum suspicion degree.Experimental results show that when applying the algorithm,the amount of alerts can be effectively decreased.And appropriate responses can be made according to all the suspicious and intrusion events.
Keywords:intrusion detection  cooperation  alert  intrusion tolerance  frequent pattern
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号