Home Library & Information Science, Book Studies Using Alert Verification to Identify Successful Intrusion Attempts
Article
Licensed
Unlicensed Requires Authentication

Using Alert Verification to Identify Successful Intrusion Attempts

  • C. Kruegel , W. Robertson and G. Vigna
Published/Copyright: December 14, 2007
Become an author with De Gruyter Brill
PIK - Praxis der Informationsverarbeitung und Kommunikation
From the journal Volume 27 Issue 4

ABSTRACT

Intrusion detection systems monitor protected networks and attempt to identify evidence of malicious activity. When an attack is detected, an alert is produced, and, possibly, a countermeasure is executed. A perfect intrusion detection system would be able to identify all the attacks without raising any false alarms. In addition, a countermeasure would be executed only when an attack is actually successful. Unfortunately false alarms are commonplace in intrusion detection systems, and perfectly benign events are interpreted as malicious. In addition, non-relevant alerts are also common. These are alerts associated with attacks that were not successful. Such alerts should be tagged appropriately so that their priority can be lowered.

The process of identifying alerts associated with successful attacks is called alert verification. This paper describes the different issues involved in alert verification and presents a tool that performs real-time verification of attacks detected by an intrusion detection system. The experimental evaluation of the tool shows that verification can dramatically reduce both false and non-relevant alerts.

Published Online: 2007-12-14
Published in Print: 2004-December

© Copyright by K.G. Saur Verlag 2004

Downloaded on 9.2.2026 from https://www.degruyterbrill.com/document/doi/10.1515/PIKO.2004.219/html
Scroll to top button