Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System
碩士 === 國立中正大學 === 通訊工程研究所 === 96 === Network hardening reduces successful network intrusion. One approach of network hardening is to remove the vulnerabilities of the systems and services in the Internet. Vulnerability scanning provides isolated vulnerabilities without correlated network topology in...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/54582630011948247086 |
id |
ndltd-TW-096CCU05650041 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096CCU056500412016-05-04T04:25:45Z http://ndltd.ncl.edu.tw/handle/54582630011948247086 Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System 聯繫入侵警報與弱點資訊關聯性之入侵途徑追蹤系統 Li-Ru Chen 陳俐如 碩士 國立中正大學 通訊工程研究所 96 Network hardening reduces successful network intrusion. One approach of network hardening is to remove the vulnerabilities of the systems and services in the Internet. Vulnerability scanning provides isolated vulnerabilities without correlated network topology information, and that’s useless for network hardening. Often, many organizations use the Intrusion Detection System (IDS) to monitor network traffic, to detect intrusions, and to recognize victims. However, they have problems in figuring out the critical segments in their network for hardening, since the flooding information of alerts and the false positive from IDS. There’s no correlation between the intrusions and overall vulnerabilities with network topology information. To understand overall vulnerabilities to network intrusion, one must consider attacks not only in isolation, but also in combination. We propose to trace intrusion path by correlating IDS alerts with overall vulnerabilities information. Match the attack graph containing overall vulnerabilities and network information with the evidence graph analyzing alerts to trace and build the intrusion path. The intrusion path finds out the key points in the intrusion for hardening, which provides the correlation between the intrusion and overall vulnerabilities. Bo-Chao Cheng 鄭伯炤 2008 學位論文 ; thesis 77 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中正大學 === 通訊工程研究所 === 96 === Network hardening reduces successful network intrusion. One approach of network hardening is to remove the vulnerabilities of the systems and services in the Internet. Vulnerability scanning provides isolated vulnerabilities without correlated network topology information, and that’s useless for network hardening. Often, many organizations use the Intrusion Detection System (IDS) to monitor network traffic, to detect intrusions, and to recognize victims. However, they have problems in figuring out the critical segments in their network for hardening, since the flooding information of alerts and the false positive from IDS.
There’s no correlation between the intrusions and overall vulnerabilities with
network topology information. To understand overall vulnerabilities to network
intrusion, one must consider attacks not only in isolation, but also in combination. We propose to trace intrusion path by correlating IDS alerts with overall vulnerabilities information. Match the attack graph containing overall vulnerabilities and network information with the evidence graph analyzing alerts to trace and build the intrusion path. The intrusion path finds out the key points in the intrusion for hardening, which provides the correlation between the intrusion and overall vulnerabilities.
|
author2 |
Bo-Chao Cheng |
author_facet |
Bo-Chao Cheng Li-Ru Chen 陳俐如 |
author |
Li-Ru Chen 陳俐如 |
spellingShingle |
Li-Ru Chen 陳俐如 Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System |
author_sort |
Li-Ru Chen |
title |
Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System |
title_short |
Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System |
title_full |
Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System |
title_fullStr |
Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System |
title_full_unstemmed |
Correlating Alerts with Vulnerability Information for an Intrusion Path Trace System |
title_sort |
correlating alerts with vulnerability information for an intrusion path trace system |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/54582630011948247086 |
work_keys_str_mv |
AT liruchen correlatingalertswithvulnerabilityinformationforanintrusionpathtracesystem AT chénlìrú correlatingalertswithvulnerabilityinformationforanintrusionpathtracesystem AT liruchen liánxìrùqīnjǐngbàoyǔruòdiǎnzīxùnguānliánxìngzhīrùqīntújìngzhuīzōngxìtǒng AT chénlìrú liánxìrùqīnjǐngbàoyǔruòdiǎnzīxùnguānliánxìngzhīrùqīntújìngzhuīzōngxìtǒng |
_version_ |
1718257672549040128 |