Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System

碩士 === 國立中正大學 === 通訊工程研究所 === 96 === Network hardening reduces successful network intrusion. One approach of network hardening is to remove the vulnerabilities of the systems and services in the Internet. Vulnerability scanning provides isolated vulnerabilities without correlated network topology in...

Full description

Bibliographic Details
Main Authors: Li-Ru Chen, 陳俐如
Other Authors: Bo-Chao Cheng
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/54582630011948247086
id ndltd-TW-096CCU05650041
record_format oai_dc
spelling ndltd-TW-096CCU056500412016-05-04T04:25:45Z http://ndltd.ncl.edu.tw/handle/54582630011948247086 Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System 聯繫入侵警報與弱點資訊關聯性之入侵途徑追蹤系統 Li-Ru Chen 陳俐如 碩士 國立中正大學 通訊工程研究所 96 Network hardening reduces successful network intrusion. One approach of network hardening is to remove the vulnerabilities of the systems and services in the Internet. Vulnerability scanning provides isolated vulnerabilities without correlated network topology information, and that’s useless for network hardening. Often, many organizations use the Intrusion Detection System (IDS) to monitor network traffic, to detect intrusions, and to recognize victims. However, they have problems in figuring out the critical segments in their network for hardening, since the flooding information of alerts and the false positive from IDS. There’s no correlation between the intrusions and overall vulnerabilities with network topology information. To understand overall vulnerabilities to network intrusion, one must consider attacks not only in isolation, but also in combination. We propose to trace intrusion path by correlating IDS alerts with overall vulnerabilities information. Match the attack graph containing overall vulnerabilities and network information with the evidence graph analyzing alerts to trace and build the intrusion path. The intrusion path finds out the key points in the intrusion for hardening, which provides the correlation between the intrusion and overall vulnerabilities. Bo-Chao Cheng 鄭伯炤 2008 學位論文 ; thesis 77 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中正大學 === 通訊工程研究所 === 96 === Network hardening reduces successful network intrusion. One approach of network hardening is to remove the vulnerabilities of the systems and services in the Internet. Vulnerability scanning provides isolated vulnerabilities without correlated network topology information, and that’s useless for network hardening. Often, many organizations use the Intrusion Detection System (IDS) to monitor network traffic, to detect intrusions, and to recognize victims. However, they have problems in figuring out the critical segments in their network for hardening, since the flooding information of alerts and the false positive from IDS. There’s no correlation between the intrusions and overall vulnerabilities with network topology information. To understand overall vulnerabilities to network intrusion, one must consider attacks not only in isolation, but also in combination. We propose to trace intrusion path by correlating IDS alerts with overall vulnerabilities information. Match the attack graph containing overall vulnerabilities and network information with the evidence graph analyzing alerts to trace and build the intrusion path. The intrusion path finds out the key points in the intrusion for hardening, which provides the correlation between the intrusion and overall vulnerabilities.
author2 Bo-Chao Cheng
author_facet Bo-Chao Cheng
Li-Ru Chen
陳俐如
author Li-Ru Chen
陳俐如
spellingShingle Li-Ru Chen
陳俐如
Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System
author_sort Li-Ru Chen
title Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System
title_short Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System
title_full Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System
title_fullStr Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System
title_full_unstemmed Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System
title_sort correlating alerts with vulnerability information for an intrusion path trace system
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/54582630011948247086
work_keys_str_mv AT liruchen correlatingalertswithvulnerabilityinformationforanintrusionpathtracesystem
AT chénlìrú correlatingalertswithvulnerabilityinformationforanintrusionpathtracesystem
AT liruchen liánxìrùqīnjǐngbàoyǔruòdiǎnzīxùnguānliánxìngzhīrùqīntújìngzhuīzōngxìtǒng
AT chénlìrú liánxìrùqīnjǐngbàoyǔruòdiǎnzīxùnguānliánxìngzhīrùqīntújìngzhuīzōngxìtǒng
_version_ 1718257672549040128