12.07.2015 Views

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Intrusion D<strong>et</strong>ectionD<strong>et</strong>ection and correlation of intrusionsResearch Staff : Frédéric Cuppens, Nora Cuppens-Boulahia, Fabien Autrel, Yacine Bouzida, AurélienCroissantPh.D. Students: Wael KanounKeywords : Intrusion d<strong>et</strong>ection, alert correlation, attack response and correlation, CRIMApplications : Security Information Management (SIM)Partners & Funding : partially funded by the European programme CELTIC in the RED project(Reaction after D<strong>et</strong>ection). partially funded by Alcatel-Lucent, ANRT through a CIFRE grant.IntroductionIntrusion d<strong>et</strong>ection is achieved through the useof n<strong>et</strong>work probes and host-based probeswhich d<strong>et</strong>ect suspicious or malicious actions.Those probes generate messages upon thed<strong>et</strong>ection of such actions. Such messages arecalled intrusion d<strong>et</strong>ection alerts and must beprocessed by the system administrator tomonitor attempts to violate the security policy.However, this task becomes almost impossibledue to the high number of alerts generated perday (up to several thousands), most of thembeing false positives, i.e alerts not related toreal attacks. Intrusions can be very complexand d<strong>et</strong>ecting them involves the correlation ofseveral alerts.• alert correlation: alerts related to the sameintrusion are linked and ponderated topresent a comprehensible scenario to thesystem administrator• attack anticipation: this module generatesvirtual alerts to anticipate the evolution ofincompl<strong>et</strong>e scenarios of attacks• response to scenarios: this module findsthe most effective responses to block ascenario or cancel the effects of an attackscenarioIn this context we have designed the CRIMmodule (Correlation and Reaction to MaliciousIntrusion) to help the system administratormanage the intrusion d<strong>et</strong>ection alerts.This research work is partially funded by theEuropean CELTIC project RED (Reaction AfterD<strong>et</strong>ection). It is also part of a thesis supportedby ANRT through a CIFRE grant andundertaken within a collaboration b<strong>et</strong>weenTELECOM Br<strong>et</strong>agne and ALCATEL-LUCENT.RealizationThe CRIM module [1] is composed of severalmodules which accomplish the following tasks(see figure 1):• alert management: alerts generated byseveral probes are centralized in adatabase for further processing• alert aggregation and fusion: similar alertsare grouped and then merged to lower thenumber of alerts to processFigure 1: The CRIM architectureThe aggregation/fusion module uses similarityfunctions b<strong>et</strong>ween alert attributes and asimilarity threshold to aggregate similar alerts.Weights are defined over alert attributes tocomply with the fact that some attributes havedifferent meanings. Compared to other rulebasedaggregation systems, this module canprocess previously unseen alerts.The correlation and response modules rely ona semi-explicit approach based on thedescription of elementary attacks instead ofcompl<strong>et</strong>e scenarios of attacks [2]. Elementaryattacks are described through the expressionof their pre-condition and post-condition. Firstorder logic is used to describe those conditionsand we have already identified a s<strong>et</strong> ofpredicates allowing us to describe several40 Extract of Pracom’s Annual Report <strong>2008</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!