Handling uncertainty in intrusion analysis

dc.contributor.authorZomlot, Loai M. M.
dc.date.accessioned2014-04-28T14:32:09Z
dc.date.available2014-04-28T14:32:09Z
dc.date.graduationmonthMayen_US
dc.date.issued2014-04-28
dc.date.published2014en_US
dc.description.abstractIntrusion analysis, i.e., the process of combing through Intrusion Detection System (IDS) alerts and audit logs to identify true successful and attempted attacks, remains a difficult problem in practical network security defense. The primary cause of this problem is the high false positive rate in IDS system sensors used to detect malicious activity. This high false positive rate is attributed to an inability to differentiate nearly certain attacks from those that are merely possible. This inefficacy has created high uncertainty in intrusion analysis and consequently causing an overwhelming amount of work for security analysts. As a solution, practitioners typically resort to a specific IDS-rules set that precisely captures specific attacks. However, this results in failure to discern other forms of the targeted attack because an attack’s polymorphism reflects human intelligence. Alternatively, the addition of generic rules so that an activity with remote indication of an attack will trigger an alert, requires the security analyst to discern true alerts from a multitude of false alerts, thus perpetuating the original problem. The perpetuity of this trade-off issue is a dilemma that has puzzled the cyber-security community for years. A solution to this dilemma includes reducing uncertainty in intrusion analysis by making IDS-nearly-certain alerts prominently discernible. Therefore, I propose alerts prioritization, which can be attained by integrating multiple methods. I use IDS alerts correlation by building attack scenarios in a ground-up manner. In addition, I use Dempster-Shafer Theory (DST), a non-traditional theory to quantify uncertainty, and I propose a new method for fusing non-independent alerts in an attack scenario. Finally, I propose usage of semi-supervised learning to capture an organization’s contextual knowledge, consequently improving prioritization. Evaluation of these approaches was conducted using multiple datasets. Evaluation results strongly indicate that the ranking provided by the approaches gives good prioritization of IDS alerts based on their likelihood of indicating true attacks.en_US
dc.description.advisorXinming (Simon) Ouen_US
dc.description.degreeDoctor of Philosophyen_US
dc.description.departmentDepartment of Computing and Information Sciencesen_US
dc.description.levelDoctoralen_US
dc.identifier.urihttp://hdl.handle.net/2097/17603
dc.language.isoen_USen_US
dc.publisherKansas State Universityen
dc.subjectEnterprise network securityen_US
dc.subjectIntrusion detection and analysisen_US
dc.subjectMachine learningen_US
dc.subjectReason about uncertaintyen_US
dc.subjectDempster-Shafer Theoryen_US
dc.subject.umiComputer Science (0984)en_US
dc.titleHandling uncertainty in intrusion analysisen_US
dc.typeDissertationen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
LoaiZomlot2014.pdf
Size:
4.71 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.62 KB
Format:
Item-specific license agreed upon to submission
Description: