On attack correlation and the benefits of sharing IDS data
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005. === Includes bibliographical references (p. 47-49). === This thesis presents the first wide-scale study of correlated attacks, i.e., attacks mounted by the same source IP against differe...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | English |
Published: |
Massachusetts Institute of Technology
2006
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/34363 |
id |
ndltd-MIT-oai-dspace.mit.edu-1721.1-34363 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-MIT-oai-dspace.mit.edu-1721.1-343632019-05-02T16:34:03Z On attack correlation and the benefits of sharing IDS data Katti, Sachin (Katti Rajsekhar) Dina Katabi. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005. Includes bibliographical references (p. 47-49). This thesis presents the first wide-scale study of correlated attacks, i.e., attacks mounted by the same source IP against different networks. Using a large dataset from 1700 intrusion detection systems (IDSs), this thesis shows that correlated attacks are prevalent in the current Internet; 20% of all offending sources mount correlated attacks and they account for more than 40% of all the IDS alerts in our logs. Correlated attacks appear at different networks within a few minutes of each other, indicating the difficulty of warding off these attacks by occasional offline exchange of lists of malicious IP addresses. Furthermore, correlated attacks are highly targeted. The 1700 DSs can be divided into small groups with 4-6 members that do not change with time; IDSs in the same group experience a large number of correlated attacks, while IDSs in different groups see almost no correlated attacks These results have important implications on collaborative intrusion detection of common attackers. They show that collaborating IDSs need to exchange alert information in realtime. Further, exchanging alerts among the few fixed IDSs in the same correlation group achieves almost the same benefits as collaborating with all IDSs, while dramatically reducing the overhead. by Sachin Katti. S.M. 2006-11-07T11:48:16Z 2006-11-07T11:48:16Z 2005 2005 Thesis http://hdl.handle.net/1721.1/34363 70079132 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 49 p. 2429738 bytes 2430326 bytes application/pdf application/pdf application/pdf Massachusetts Institute of Technology |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Electrical Engineering and Computer Science. |
spellingShingle |
Electrical Engineering and Computer Science. Katti, Sachin (Katti Rajsekhar) On attack correlation and the benefits of sharing IDS data |
description |
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005. === Includes bibliographical references (p. 47-49). === This thesis presents the first wide-scale study of correlated attacks, i.e., attacks mounted by the same source IP against different networks. Using a large dataset from 1700 intrusion detection systems (IDSs), this thesis shows that correlated attacks are prevalent in the current Internet; 20% of all offending sources mount correlated attacks and they account for more than 40% of all the IDS alerts in our logs. Correlated attacks appear at different networks within a few minutes of each other, indicating the difficulty of warding off these attacks by occasional offline exchange of lists of malicious IP addresses. Furthermore, correlated attacks are highly targeted. The 1700 DSs can be divided into small groups with 4-6 members that do not change with time; IDSs in the same group experience a large number of correlated attacks, while IDSs in different groups see almost no correlated attacks These results have important implications on collaborative intrusion detection of common attackers. They show that collaborating IDSs need to exchange alert information in realtime. Further, exchanging alerts among the few fixed IDSs in the same correlation group achieves almost the same benefits as collaborating with all IDSs, while dramatically reducing the overhead. === by Sachin Katti. === S.M. |
author2 |
Dina Katabi. |
author_facet |
Dina Katabi. Katti, Sachin (Katti Rajsekhar) |
author |
Katti, Sachin (Katti Rajsekhar) |
author_sort |
Katti, Sachin (Katti Rajsekhar) |
title |
On attack correlation and the benefits of sharing IDS data |
title_short |
On attack correlation and the benefits of sharing IDS data |
title_full |
On attack correlation and the benefits of sharing IDS data |
title_fullStr |
On attack correlation and the benefits of sharing IDS data |
title_full_unstemmed |
On attack correlation and the benefits of sharing IDS data |
title_sort |
on attack correlation and the benefits of sharing ids data |
publisher |
Massachusetts Institute of Technology |
publishDate |
2006 |
url |
http://hdl.handle.net/1721.1/34363 |
work_keys_str_mv |
AT kattisachinkattirajsekhar onattackcorrelationandthebenefitsofsharingidsdata |
_version_ |
1719042984832401408 |