type are desired, the quantity of rules to be deduced
by Apriori will be very large. This, apart from
having a high computational cost, complicates the
rules redundancy reduction task. In any case, the
association rules provide many benefits: they are a
representative sample of the whole alert-set and
facilitate the legibility of the alarm-set.
As a conclusion, MIAU supplies an attack
scenario detection system by applying a novel data
mining algorithm combination. The results have
been very encouraging and there is still room for
improvement the system.
6 FURTHER WORK
One possible improvement of MIAU consists on
tuning the EM algorithm configuration parameters in
order to obtain a more coherent and homogeneous
clustering. These configuration parameters, such as
the number of iterations or the allowable maximum
standard deviation, can be adjusted finely even by
means of trial and error methods. That way, the
Clustering phase would obtain a better segmentation
of the whole alert-set, without including very
different alerts into the same cluster. Consequently,
the association rules algorithm would be able to
extract more precise information because it would be
working on a more homogeneous alert-set.
The association rules deducing phase may also
be improved adjusting the Apriori algorithm
configuration parameters, such as the number of
rules or the metric type. In addition to this, the rules
redundancy reduction algorithm may be optimised
with the purpose of obtaining a more compact,
precise and complete rule-set in less time.
Another possible improvement of MIAU is the
creation of a complete ATP table, permitting the
system to cover the whole type of traffic that can
exist in a network. This can be made analysing the
characteristics of known attacks and traffic and
codifying them with the ATP table format.
REFERENCES
Ning, P., Ciu, Y., Reeves, D., 2002. Analyzing Intensive
Intrusion Alerts Via Correlation. In Proceedings of the
5th International Symposium on Recent Advances in
Intrusion Detection. Springer-Verlag, Switzerland,
pp.74-94.
Debar, H., Wespi, A., 2001. Aggregation and Correlation
of Intrusion-Detection Alerts. In Proceedings of the
4th International Symposium on Recent Advances in
Intrusion detection. Springer-Verlag, USA, pp. 85-
103.
Cuppens, F., Miège, A., 2002. Alert Correlation in a
Cooperative Intrusion Detection Framework. In
Proceeding of the 2002 IEEE Symposium on Security
and Privacy. IEEE Computer Society. USA, pp. 202
Templeton, S., Levitt, K., 2000. A requires/provides
model for computer attacks. In Proceedings of the
Workshop on New Security Paradigms. pp. 31–38.
Zhou, J., Heckman, M., Reynolds, B., Carlson, A., Bishop,
M., 2007. Modelling network intrusion detection alerts
for correlation. ACM Transactions on Information and
System Security 10 (1).
Julisch, K. 2003. Clustering Intrusion Detection Alarms to
Support Root Cause Analysis. ACM Transactions on
Information and System Security 6 (4). ACM Press,
pp. 443-471.
Manganaris, S., Christensen, M., Zerkle, D., Hermiz, K.,
2000. A Data Mining Analysis of RTID Alarms.
Computer Networks 34 (4). Elsevier North-Holland,
Inc., pp. 571-577.
Treinen, J.J., Thurimella, R., 2006. A framework for the
application of association rule mining in large
intrusion detection database. In Proceedings of the 9th
International Symposium on Recent Advances in
Intrusion Detection. Springer-Verlag, Zurich, pp. 1-
18.
Clifton, C., Gengo, G., 2000. Developing custom intrusion
detection filters using data mining. In 2000 Military
Communications International Symposium. USA. pp.
22-25.
Valdés, A., Skinner, K., 2001. Probabilistic Alert
Correlation. In Proceedings of the 4th International
Symposium on Recent Advances in Intrusion
Detection. Springer-Verlag. USA.
Dain, O., Cunningham, R.K., 2001. Fusing Heterogeneous
Alert Streams into Scenarios. In Proceedings of the
ACM CCS Workshop on Data Mining for Security
Applications. Barbará and Jajodia. USA.
Witten, I., Frank, E., 2005. Data Mining: Practical
Machine Learning Tools and Techniques. Morgan
Kaufmann Series in Data Management Systems.
Dempster, A., Laird, N., Rubin, D., 1977. Maximum
Likelihood for Incomplete Data via the EM Algorithm.
Royal Statistical Society, Vol.1, N.1.
Agrawal, R., Srikant, R., 1994. Fast Algorithms for
mining association rules in large databases. In
Proceedings of 20th International Conference on Very
Large Databases. Santiago de Chile. pp. 487-489.
SECRYPT 2007 - International Conference on Security and Cryptography
72