A Hybrid Alarm Management Strategy in Signature-Based Intrusion Detection Systems
Title | A Hybrid Alarm Management Strategy in Signature-Based Intrusion Detection Systems |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Cortés, Francisco Muñoz, Gaviria Gómez, Natalia |
Conference Name | 2019 IEEE Colombian Conference on Communications and Computing (COLCOM) |
Keywords | alarm correlation techniques, alarm prioritization, Alarm systems, Correlation, cybersecurity defense strategy, Databases, digital signatures, dynamic network context information, event normalizer, false alarm minimization, false alarm reduction, HP Arsight priority formula, hybrid alarm management strategy, Intrusion detection, intrusion detection system, IP networks, Measurement, Minimization, Prelude SIEM, pubcrawl, resilience, Resiliency, Scalability, Sensors, signature based defense, Signature-based IDS, signature-based intrusion detection systems, similarity-based correlation, vulnerability analysis |
Abstract | Signature-based Intrusion Detection Systems (IDS) are a key component in the cybersecurity defense strategy for any network being monitored. In order to improve the efficiency of the intrusion detection system and the corresponding mitigation action, it is important to address the problem of false alarms. In this paper, we present a comparative analysis of two approaches that consider the false alarm minimization and alarm correlation techniques. The output of this analysis provides us the elements to propose a parallelizable strategy designed to achieve better results in terms of precision, recall and alarm load reduction in the prioritization of alarms. We use Prelude SIEM as the event normalizer in order to process security events from heterogeneous sensors and to correlate them. The alarms are verified using the dynamic network context information collected from the vulnerability analysis, and they are prioritized using the HP Arsight priority formula. The results show an important reduction in the volume of alerts, together with a high precision in the identification of false alarms. |
DOI | 10.1109/ColComCon.2019.8809121 |
Citation Key | cortes_hybrid_2019 |
- hybrid alarm management strategy
- Vulnerability Analysis
- similarity-based correlation
- signature-based intrusion detection systems
- Signature-based IDS
- sensors
- Scalability
- Resiliency
- resilience
- Prelude SIEM
- Minimization
- Measurement
- IP networks
- intrusion detection system
- Intrusion Detection
- signature based defense
- HP Arsight priority formula
- false alarm reduction
- false alarm minimization
- event normalizer
- dynamic network context information
- digital signatures
- Databases
- cybersecurity defense strategy
- Correlation
- Alarm systems
- alarm prioritization
- alarm correlation techniques
- pubcrawl