Skip to main navigation Skip to search Skip to main content

Intrusion detection alarms reduction using root cause analysis and clustering

  • Safaa O. Al-Mamory*
  • , Hongli Zhang
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

As soon as the Intrusion Detection System (IDS) detects any suspicious activity, it will generate several alarms referring to as security breaches. Unfortunately, the triggered alarms usually are accompanied with huge number of false positives. In this paper, we use root cause analysis to discover the root causes making the IDS triggers these false alarms; most of these root causes are not attacks. Removing the root causes enhances alarms quality in the future. The root cause instigates the IDS to trigger alarms that almost always have similar features. These similar alarms can be clustered together; consequently, we have designed a new clustering technique to group IDS alarms and to produce clusters. Then, each cluster is modeled by a generalized alarm. The generalized alarms related to root causes are converted (by the security analyst) to filters in order to reduce future alarms' load. The suggested system is a semi-automated system helping the security analyst in specifying the root causes behind these false alarms and in writing accurate filtering rules. The proposed clustering method was verified with three different datasets, and the averaged reduction ratio was about 74% of the total alarms. Application of the new technique to alarms log greatly helps the security analyst in identifying the root causes; and then reduces the alarm load in the future.

Original languageEnglish
Pages (from-to)419-430
Number of pages12
JournalComputer Communications
Volume32
Issue number2
DOIs
StatePublished - 12 Feb 2009
Externally publishedYes

Keywords

  • Alarms clustering
  • False positive
  • Intrusion detection system
  • Network security
  • Root causes

Fingerprint

Dive into the research topics of 'Intrusion detection alarms reduction using root cause analysis and clustering'. Together they form a unique fingerprint.

Cite this