Skip to main content
Log in

CRIM: un module de corrélation d’alertes et de réaction aux attaques

CRIM: An alert correlation and reaction module

  • Published:
Annales Des Télécommunications Aims and scope Submit manuscript

Résumé

Avec le besoin grandissant de protéger les systèmes d’informations, la détection d’intrusion constitue une démarche intéressante mais encore très imparfaite. Il y a actuellement deux approches principales de la détection d’intrusion : l’approche comportementale et l’approche par détection de scénarios. Aucune de ces approches n ’est complètement satisfaisante. Elles génèrent souvent de trop nombreux faux positifs et les alertes sont trop élémentaires et insuffisamment précises pour être directement exploitables par un administrateur de sécurité. Une approche intéressante consiste à développer un module de coopération pour analyser et corréler les alertes, générer un diagnostic plus global et synthétique, et aider l’administrateur de sécurité dans le choix d’une contre-mesure adaptée à l’attaque détectée. Cet article présente les travaux que nous avons réalisés, dans ce contexte, pour concevoir le moduleRim (Coopération de Reconnaissance d’Intentions Malveillantes).

Abstract

With the growing need for protection of informations systems, the intrusion detection approach is interesting but still imperfect. At the moment two main approaches exist: the behaviour based approach and the scenario detection approach. None of those two approaches is fully satisfactory. They often generate two many false positives and the generated alerts are generally too elementary and imprecise to be efficiently processed by a system administrator. An interesting approach consists in developing a cooperation module to analyze and correlate alerts, to generate a more global and synthetic diagnostic, and help the system administrator to choose the best counter-measure given a detected attack. This article presents the work we have achieved in this context to create theRim module (Cooperation and Recognition of Malevolent Intentions).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Bibliographie

  1. Autrel (F.), Benferhat (S.), Cuppens (F.), Utilisation de la corrélation pondérée dans un processus de détection d’intrusion.Annales des Télécommunications,59, no 9–10, pp. 1072–1091, 2004.

    Google Scholar 

  2. Autrel (F.),Cuppens (F.), Using an Intrusion Detection Alert Similarity Operator to Aggregate and Fuse Alerts.In the 4th Conference on Security and Network Architectures, 6–10 June 2005, Batz sur Mer (France).

  3. Cuppens (F.), Autrel (F.), Bouzida (Y.), Garcia (J.), Gombault (S.), Sans (T.), Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework.Annales des Telecommunications,61, no 1–2, pp. 197–217, 2006.

    Google Scholar 

  4. Bace (R.), Intrusion Detection.McMillan Technical Publishing, 2000.

  5. Benferhat (S.),Autrel (F.),Cuppens (F.), Enhanced Correlation in an Intrusion Detection Process.Second International Workshop Mathematical Methods, Models and Architectures for Computer Networks Security, St. Petersburg, Russia, September 2003.

  6. Ben Amor (N.),Benferhat (S.),Elouedi (Z.), Naive Bayesian Networks in Intrusion Detection Systems.Workshop on Probabilistic Graphical Models for Classification, Cavtat-Dubrovnik, Croatia, September 2003.

  7. Bouzida (Y.),Gombault (S.), Profils propres pour la détection d’intrusion.Symposium sur la Sécurité des Technologies de l’Information et de la Communication, Rennes, France, June 2003.

  8. Cuppens (F.),Autrel (F),Miège (A.),Benferhat (S.), Recognizing Malicious Intention in an Intrusion Detection Process.Second International Conference on Hybrid Intelligent Systems, Santiago, Chile, December 2002.

  9. Curry (D.),Debar (H.), Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (Xml) Document Type Definition, draft-itetf-idwg-idmef-xml-14.txt, Janvier 2005.

  10. Cuppens (F.),Miège (A.), Alert correlation in a cooperative intrusion detection framework.IEEE Symposium on Research in Security and Privacy, Oakland, May 2002.

  11. Cuppens (F.),Ortalo (R.),Lambda : A Language to Model a Database for Detection of Attacks. Proceedings of the Third International Workshop on the Recent Advances in Intrusion Detection (Raid ’2000), Toulouse, France, October 2000.

  12. Cuppens (F), Cooperative intrusion detection.International Symposium on Information Superiority : tools for crisis and conflict management, Paris, France, September 2001.

  13. Cuppens (F), Managing alerts in a multi-intrusion detection environment. 17thAcsac conference, New Orleans, December 2001.

  14. Site web deRim.http://crim-platinum.org/crim/.

  15. Debar (H.),Wespi (A.), Aggregation and Correlation of Intrusion Detection Alerts. Workshop on the Recent Advances in Intrusion Detection (Raid’2001), Davis, USA, October 2001.

  16. Geib (C),Goldman (R.), Plan Recognition in Intrusion Detection Systems,Darpa Information Survivability Conference and Exposition (DIScEX), pp. 46–55, Anaheim, USA, June 2001.

  17. Huang (M. -Y.), A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis. Proceedings of the First International Workshop on the Recent Advances in Intrusion Detection (Raid ’98), Louvain-La-Neuve, Belgium, 1998.

  18. Garcia (J.),Autrel (F.),Borrell (J.),Castillo (S.),Cuppens (F.),Navarro (G.), Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation. Proceedings of the Sixth International Conference on Information and Communications Security (Icics’2004), number 3269 illLncs, October 2004.

  19. Garcia (J.),Autrel (F.),Borrell (J.),Castillo (S.),Cuppens (F),Navarro (G.), Preventing coordinated attacks via alert correlation. Proceedings of the Ninth Nordic Workshop on Secure it Systems Encouraging Cooperation (Nordsec’2004), November 2004.

  20. Gombault (S.),Diop (M.), Response function. FirstNato Symposium on Real Time Intrusion Detection, Lisbonne, Portugal. May 2002.

  21. Julisch (K.), Clustering Intrusion Detection Alarms to Support Root Cause Analysis.Acm Transactions on Information and System Security, Novembre 2003.

  22. Ilgun (K.),Ustat: A real-time intrusion detection system for Unix. IEEE Symposium on Security and Privacy, 1993.

  23. Jackson (K.),Dubois (D.),Stalling (C.), An Expert System Application for Network Intrusion Detection.14th National Computer Security Conference, October 1991.

  24. Kleinwaechter (J.), The Limitations of Intrusion Detection on High Speed Networks. Proceedings of the First International Workshop on the Recent Advances in Intrusion Detection (Raid’98), Louvain-LaNeuve, Belgium, 1998.

  25. Lee (W.), Combining Knowledge Discovery and Knowledge Engineering to BuildIdss. Proceedings of the Second International Workshop on the Recent Advances in Intrusion Detection (Raid ’99, Purdue, USA, October 1999.

  26. Lippmann (R.), Using Key String and Neural Networks to Reduce False Alarms and Detect New Attacks with Sniffer-Based Intrusion Detection Systems. Proceedings of the Second International Work-shop on the Recent Advances in Intrusion Detection (Raid’99), Purdue, USA, October 1999.

  27. Lunt (T.),Ides: An Intelligent System for Detecting Intruders.Computer Security, Threats and Counter-measures, November 1990.

  28. Mounji (A.), LeCharlier (B.), Continuous Assessment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis. Proceedings of theIso C’97 Symposium on Network and Distributed System Security, San Diego, USA, February 1997.

  29. Mann (D.), Christey (S.), Towards a Common Enumeration of Vulnerabilities.2nd Workshop on Research with Security Vulnerability Databases, Purdue University, West Lafayette, Indiana, January 1999.

    Google Scholar 

  30. Morin (B.),Debar (H.), Correlation of Intrusion Symptoms : an Application of Chronicles. Proceedings of the Sixth International Symposium on the Recent Advances in Intrusion Detection (Raid’02), Pittsburg, USA, September 2003.

  31. (L.),Marakchi (Z.),Michel (C),Debar (H.),Cuppens (F), La détection d’intrusions: les outils doivent coopérer. Revue de laRee, 2001.

  32. Morin (B.), (L.),Debar (H.),Ducassé (M.) M2D2: A Formal Data Model for ids Alert Correlation. Fifth International Conference on Recent Advances in Intrusion Detection (Raid ’02), Zurich, Switzerland, October 2002.

  33. Nino (P.),Cui (V.),Reeves (R. S.), Constructing attack scenarios through correlation of intrusion alerts. NinthAcm Conference on Computer and Communications Security, Washington, D.C., November 2002.

  34. Fyodor, Nmap (Network Mapper) free open source security scanner. http ://www.insecure.org/nmap/

  35. Karg (D.),Gil (D.),Casai, (J.),Ospitia (F.),Roman (A.),Fournier (S.),Lorenzo (J.M.), Open Source Security Information Management.http://www.ossim.net

  36. Porras (P.),Neumann (P.), Emerald : Event Monitoring Enabling Responses to Anomalous Live Disturbances.National Security Conference, 1997.

  37. Roescli (M.), Snort-Lightweight Intrusion Detection for Networks. Proceedings ofUsenix lisa’99, November 1999.

  38. Valdes (A.),Anderson (D.), Statistical Methods for Computer Usage Anomaly Detection.Third International Workshop on Rough Sets and Soft Computing, San Jose, USA, 1995.

  39. Valdes (A.),Skinner (K.), Adaptive, Model-Based Monitoring for Cyber Attack Detection. Proceedings of the Third International Workshop on the Recent Advances in Intrusion Detection (Raid’2000), Toulouse, France, October 2000.

  40. Valdes (A.),Skinner (K.), Probabilistic Alert Correlation. Proceedings of the Fourth International Workshop on the Recent Advances in Intrusion Detection (Raid’2001), Davis, USA, October 2001.

  41. Zerkle (D.), A Data-Mining Analysis ofRtid, Proceedings of the Second International Workshop on the Recent Advances in Intrusion Detection (Raid’99), Purdue, USA, October 1999.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Autrel, F., Cuppens, F. CRIM: un module de corrélation d’alertes et de réaction aux attaques. Ann. Télécommun. 61, 1172–1192 (2006). https://doi.org/10.1007/BF03219887

Download citation

  • Received:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03219887

Mots clés

Key words

Navigation