作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (2): 267-269. doi: 10.3969/j.issn.1000-3428.2008.02.090

• 开发研究与设计技术 • 上一篇    下一篇

入侵检测系统中报警验证模块的设计与实现

左 晶1,段海新2,于雪莉2   

  1. (1. 清华大学电子工程系,北京 100084;2. 清华大学信息网络工程研究中心,北京 100084)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-01-20 发布日期:2008-01-20

Design and Implementation of Alert Verification Module
in Intrusion Detection System

ZUO Jing1, DUAN Hai-xin2, YU Xue-li2   

  1. (1. Department of Electronic Engineering, Tsinghua University, Beijing 100084;
    2. Research Center of Information Network Engineering, Tsinghua University, Beijing 100084)

  • Received:1900-01-01 Revised:1900-01-01 Online:2008-01-20 Published:2008-01-20

摘要: 传统入侵检测系统虽然可以根据特征匹配的方法检测出攻击企图,却无法验证攻击企图是否成功,生成的报警不仅数量巨大而且误警率很高。该文提出一种结合漏洞扫描工具对入侵检测系统生成的报警进行验证的方法,根据被攻击主机是否包含能使攻击成功的漏洞来判定攻击能否成功,对攻击的目标主机不存在对应漏洞的报警降低优先级,从而提高报警质量。说明了报警验证模型各部分的设计和实现方法,系统运行结果显示该方法能有效地压缩报警量,降低误警率,帮助管理员从大量数据中找到最应该关注的真实报警。

关键词: 报警验证, 入侵检测系统, 网络安全

Abstract: Traditional intrusion detection system detects intrusion attempts using signature-based method,but it can hardly determine if the attempt is successful. As a result, alerts generated by IDS are not only huge in number but also poor in data quality, i.e. containing false positive alerts. This paper presents a method to verify alerts using vulnerability-scanning tools. The idea of alert verification is to check if the destination host has the necessary vulnerability that can make the intrusion successful. According to the result of alert verification process, attacks that possibly failed are degraded in priority. The experimental result shows that the alert verification model in distributed IDS can compress the duplicated alerts, reduce false positives efficiently, which helps network administrators focus on actual alerts from overwhelming amount of data.

Key words: alert verification, Intrusion Detection System(IDS), network security

中图分类号: