Abstract
Internet is providing essential communication between an infinite number of people and is being increasingly used as a tool for commerce. At the same time, security is becoming a tremendously important issue to deal with. Different network security solutions exist and contribute to enhanced security. From these solutions, Intrusion detection systems (IDS) have become one of the most common countermeasures for monitoring safety in computer systems and networks. The purpose of IDSs is distinguishing between intruders and normal users. However, IDSs report a massive number of isolated alerts. These isolated alerts represent low-level security-related events. Many of these isolated alerts are logically involved in a single multi-stage intrusion incident and a security officer often wants to analyze the complete incident instead of each individual simple alert. Another problem is that IDSs cannot work correctly with an environment managed with a NAT technique (Network Address Translation) since the host information (IP address and port number) are affected by the NAT devices. In order to address these limitations, the paper proposes a well-structured model to manage the massive number of isolated alerts and includes the NAT information in the IDS analysis. In fact, our solution permits to determine the real identities of entities implicated in security issues and abstracts the logical relation between alerts in order to support automatic correlation of those alerts involved in the same intrusion and to construct comprehensible attacks scenarios.












Similar content being viewed by others
References
Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: Ninth Annual CSI/FBI Computer Crime and Security Survey. Computer Security Institute (2004)
Morin, B., Me, L., Debar, H., Ducasse, M.: M2D2: a formal data model for IDS alert correlation. Recent advances in intrusion detection (RAID2002). In: Lecture Notes in Computer Science, vol. 2516, pp. 115–137. Springer, Berlin (2002)
Cohen, F.B.: Simulating Cyber Attacks, Defences, and Consequences. The Infosec technical baseline studies, March 1999. http://www.all.net/journal/ntb/simulate/simulate.html (1999)
Senie, D.: Network address translator (NAT)-friendly application design guidelines, RFC 3235
Hain, T.: Architectural Implications of NAT, RFC 2993
Shieh, S.-P., Ho, F.-S., Huang, Y.-L., Luo, J.-N.: Network address translators: effects on security protocols and applications in the TCP/IP stack. IEEE INTERNET COMPUTING. (2000)
Cuppens, F., Miège, A.: Alert correlation in a cooperative intrusion detection framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P02). (2002)
Kruegel, C., Valeur, F., Vigna, G.: Intrusion detection and correlation. Advances in information security, vol. 14. Springer, Berlin (2005)
Afonso, J., Monteiro, E., Costa, V.: Development of an integrated solution for intrusion detection: a model based on data correlation. 2006 IEEE. (2006)
Huang, T.-C., Shieh, C.-K., Lai, W.-H., Miao, Y.-B.: Smart tunnel union for NAT traversal. In: Proceedings of the 2005 Fourth IEEE International Symposium on Network Computing and Applications (NCA’05). (2005)
Goto, Y., Suzuki, H., Watanabe, A.: Researches on Extended Dynamic Process Resolution Protocol that Can Traverse NAT. 2007 IEEE. (2007)
RFC 3947 at http://www.ietf.org/rfc/rfc3947.txt
RFC 3948 at http://www.ietf.org/rfc/rfc3948.txt
Curry, D., Debar, H.: Intrusion detection message exchange format data model and extensible markup language (XML) document type definition. Draft-itetf-idwg-idmef-xml-03.txt, Feb 2001
Common Vulnerabilities and Exposures, http://www.cve.mitre.org/about/
Valdes, A., Skinner, K.: Probabilistic alert correlation. Recent advances in intrusion detection (RAID2001). In: Lecture Notes in Computer Science, vol. 2212, pp. 54–68. Springer, Berlin (2001)
Lee, S., Chung, B., Kim, H., Lee, Y., Park, C., Yoon, H.: Real-time analysis of intrusion detection alerts via correlation. J. Comput. Secur. (2005)
Debar, H., Wespi, A.: Aggregation and correlation of intrusion-detection alerts. Recent advances in intrusion detection (RAID2001). In: Lecture Notes in Computer Science, vol. 2212, pp. 85–103. Springer, Berlin (2001)
Browne, H., Arbaugh, W., McHugh, J., Fithen, W.: A trend analysis of exploitations. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 214–29. May (2001)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sourour, M., Adel, B. & Tarek, A. Network Security Alerts Management Architecture for Signature-Based Intrusions Detection Systems within a NAT Environment. J Netw Syst Manage 19, 472–495 (2011). https://doi.org/10.1007/s10922-010-9195-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10922-010-9195-4