Intrusion Alert Correlation
by
Norazah Aziz (GCIA)
Cyberspace Security Lab, MIMOS Berhad
Outline
• Why Correlation?
• Correlation Process
• Correlation Techniques
• Conclusion
Terminologies
• Correlation
– The degree to which or more attributes or measurements on the same group of elements show a tendency to vary together. Source:
http://dictionary.reference.com/browse/correlation
• Event
– Low level entity that analyzed by IDS eg: Network packets
• Alert
– Generated by IDS to notify of the interesting events.
• Alert Correlation
– Multi step process that receives alerts from one or more intrusion
detection systems as input and produces a high-level description of the
malicious activity on the network.
Outline
• Why Correlation?
• Correlation Process
• Correlation Techniques
• Conclusion
• Q&A
Correlation can address some if the IDS weaknesses
• Alert Flooding
– generate a large amount of alerts
• Context
– not group related alerts
• False Alert
– generate a false negative and false positive
• Scalability
– difficult to achieve large-scale deployment
With correlation..
• Can capture a high level view of the attack
activity on the target network without losing
security-relevant information.
Outline
• Why Correlation?
• Correlation Process
• Correlation Techniques
• Conclusion
• Q&A
Main correlation process
• Alert Collection
• Alert Aggregation and Verification
• High Level Alert Structures
Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification
Thread Reconstruction
Attack Session Reconstruction
Focus Recognition Multi-Step
Correlation Impact
Analysis Prioritization
Intrusion Reports
Sensor Ontology Databases
Asset Database
Alert Collection Alert Aggregation & Verification
High-Level Alert Structures
Correlation Process
Attack Scenario Example
10.1.9.2, Linux Running Apache
Running Application Log IDS (APPL)
INTERNET
Attacker 67.6.1.0
Switch
NIDS1
NIDS2
HIDS Portscan
Worm exploit Mic.IIS Failed
Apache Buffer Overflow Exploit
Local exploit against linuxconf
HIDS HIDS APPL NIDS1 NIDS1 NIDS1 NIDS2 Sensor
10.1.9.2, port:80 20.9.0.1
11:5/11:5 IIS Exploit
3
linuxconf 21:4/21:4
Local Exploit 7
linuxconf 21:3/21:3
Local Exploit 6
Localhost, Apache 19:1/19:1
Bad Request 5
10.1.9.2 port:80 67.6.1.0
19:0/19:0 Apache Exploit
4
10.1.9.2 67.6.1.0
09:0/14:1 Portscan
2
10.1.9.2 67.6.1.0
09:1/13:9 Scanning
1
Tag Dest IPs
Src IPs Start/End
Signature ID
Attack Scenario Alerts
Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification
Thread Reconstruction
Attack Session Reconstruction
Focus Recognition Multi-Step
Correlation Impact
Analysis Prioritization
Intrusion Reports
Sensor Ontology Databases
Asset Database
Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.
Alert Collection Alert Aggregation & Verification
High-Level Alert Structures
Alert Normalization
Alert Normalization
HIDS HIDS APPL NIDS1 NIDS1 NIDS1 NIDS2 Sensor
10.1.9.2, port:80 20.9.0.1
11:5/11:5 IIS Exploit
3
linuxconf 21:4/21:4
Local Exploit 7
linuxconf 21:3/21:3
Local Exploit 6
Localhost, Apache 19:1/19:1
Bad Request 5
10.1.9.2 port:80 67.6.1.0
19:0/19:0 Apache Exploit
4
10.1.9.2 67.6.1.0
09:0/14:1 Portscan
2
10.1.9.2 67.6.1.0
09:1/13:9 Scanning
1
Tag Dest IPs
Src IPs Start/End
Signature ID
NIDS1 NIDS2 Sensor
10.1.9.2 67.6.1.0
09:0/14:1 Portscan
2
10.1.9.2 67.6.1.0
09:1/13:9 Portscan
1
Tag Dest IPs
Src IPs Start/End
Signature ID
Standardize the alert messages in different formats using CVE (Common
Vulnerabilities and Exposures)
Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification
Thread Reconstruction
Attack Session Reconstruction
Focus Recognition Multi-Step
Correlation Impact
Analysis Prioritization
Intrusion Reports
Sensor Ontology Databases
Asset Database
Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.
Alert Collection Alert Aggregation & Verification
High-Level Alert Structures
Alert Preprocessing
Alert Preprocessing
HIDS HIDS APPL NIDS1 NIDS1 NIDS1 NIDS2 Sensor
10.1.9.2, port:80 20.9.0.1
11:5/11:5 IIS Exploit
3
linuxconf 21:4/21:4
Local Exploit 7
linuxconf 21:3/21:3
Local Exploit 6
Localhost, Apache 19:1/19:1
Bad Request 5
10.1.9.2 port:80 67.6.1.0
19:0/19:0 Apache Exploit
4
10.1.9.2 67.6.1.0
09:0/14:1 Portscan
2
10.1.9.2 67.6.1.0
09:1/13:9 Portscan
1
Tag Dest IPs
Src IPs Start/End
Signature ID
HIDS 10.1.9.2, linuxconf
10.1.9.2 21:4/21:4
Local Exploit 7
HIDS APPL
Sensor
10.1.9.2, linuxconf 10.1.9.2
21:3/21:3 Local Exploit
6
10.1.9.2, Apache 10.1.9.2
19:1/19:1 Bad Request
5
Tag Dest IPs
Src IPs Start/End
Signature ID
Supply best-effort values information by
determine the alert’s source and target
Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification
Thread Reconstruction
Attack Session Reconstruction
Focus Recognition Multi-Step
Correlation Impact
Analysis Prioritization
Intrusion Reports
Sensor Ontology Databases
Asset Database
Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.
Alert Collection Alert Aggregation & Verification
High-Level Alert Structures
Alert Fusion
Alert Fusion
HIDS HIDS APPL NIDS1 NIDS1 NIDS1 NIDS2 Sensor
10.1.9.2, port:80 20.9.0.1
11:5/11:5 IIS Exploit
3
10.1.9.2, linuxconf 10.1.9.2
21:4/21:4 Local Exploit
7
10.1.9.2, linuxconf 10.1.9.2
21:3/21:3 Local Exploit
6
10.1.9.2, Apache 10.1.9.2
19:1/19:1 Bad Request
5
10.1.9.2 port:80 67.6.1.0
19:0/19:0 Apache Exploit
4
10.1.9.2 67.6.1.0
09:0/14:1 Portscan
2
10.1.9.2 67.6.1.0
09:1/13:9 Portscan
1
Tag Dest IPs
Src IPs Start/End
Signature ID
{NIDS1,NIDS2}
HIDS
Sensor
{1,2}
10.1.9.2 67.6.1.0
09:0/13:9 Meta-Alert-
8
10.1.9.2, linuxconf 10.1.9.2
21:4/21:4 Local Exploit
7
Tag Dest IPs
Src IPs Start/End
Signature ID
Identifies alerts that refer to the same
underlying event
Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification
Thread Reconstruction
Attack Session Reconstruction
Focus Recognition Multi-Step
Correlation Impact
Analysis Prioritization
Intrusion Reports
Sensor Ontology Databases
Asset Database
Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.
Alert Collection Alert Aggregation & Verification
High-Level Alert Structures
Alert Verification
Alert Verification
{1,2}
{NIDS1,NIDS2}
10.1.9.2 67.6.1.0
09:0/13:9 Meta-Alert-
8
HIDS HIDS APPL NIDS1 NIDS1 NIDS1 NIDS2 Sensor
10.1.9.2, port:80 20.9.0.1
11:5/11:5 IIS Exploit
3
10.1.9.2, linuxconf 10.1.9.2
21:4/21:4 Local Exploit
7
10.1.9.2, linuxconf 10.1.9.2
21:3/21:3 Local Exploit
6
10.1.9.2, Apache 10.1.9.2
19:1/19:1 Bad Request
5
10.1.9.2 port:80 67.6.1.0
19:0/19:0 Apache Exploit
4
10.1.9.2 67.6.1.0
09:0/14:1 Portscan
2
10.1.9.2 67.6.1.0
09:1/13:9 Portscan
1
Tag Dest IPs
Src IPs Start/End
Signature ID
NIDS1 NIDS1
Sensor
10.1.9.2 port:80 67.6.1.0
19:0/19:0 Apache Exploit
4
Irrelevant 10.1.9.2, port:80
20.9.0.1 11:5/11:5
IIS Exploit 3
Tag Dest IPs
Src IPs Start/End
Signature ID
Remove or ignore the irrelevant alerts,
e.g. unsuccessful alert
Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification
Thread Reconstruction
Attack Session Reconstruction
Focus Recognition Multi-Step
Correlation Impact
Analysis Prioritization
Intrusion Reports
Sensor Ontology Databases
Asset Database
Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.
Alert Collection Alert Aggregation & Verification
High-Level Alert Structures
Attack Thread Reconstruction
Thread Reconstruction
{6,7}
HIDS 10.1.9.2, linuxconf
10.1.9.2 21:3/21:4
Meta-Alert 10
{4,8}
{NIDS1,NIDS2}
10.1.9.2, port:80 67.6.1.0
09:0/19:0 Meta-Alert
9
{1,2}
correlated {NIDS1,NIDS2}
10.1.9.2 67.6.1.0
09:0/13:9 Meta-Alert
8
HIDS HIDS APPL NIDS1 NIDS1 NIDS1 NIDS2 Sensor
irrelevant 10.1.9.2, port:80
20.9.0.1 11:5/11:5
IIS Exploit 3
correlated 10.1.9.2, linuxconf
10.1.9.2 21:4/21:4
Local Exploit 7
correlated 10.1.9.2, linuxconf
10.1.9.2 21:3/21:3
Local Exploit 6
10.1.9.2, Apache 10.1.9.2
19:1/19:1 Bad Request
5
correlated 10.1.9.2, port:80
67.6.1.0 19:0/19:0
Apache Exploit 4
10.1.9.2 67.6.1.0
09:0/14:1 Portscan
2
10.1.9.2 67.6.1.0
09:1/13:9 Portscan
1
Tag Dest IPs
Src IPs Start/End
Signature ID
Combines a series of alerts that refer to attacks
launched by one attacker against a single target.
Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification
Thread Reconstruction
Attack Session Reconstruction
Focus Recognition Multi-Step
Correlation Impact
Analysis Prioritization
Intrusion Reports
Sensor Ontology Databases
Asset Database
Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.
Alert Collection Alert Aggregation & Verification
High-Level Alert Structures
Attack Session Reconstruction
Session Reconstruction
{5,9}
{NIDS1,NIDS2, APPL}
10.1.9.2, port:80, Apache
{67.6.1.0 ,10.1.9.2}
09:0/19:1 Meta-Alert
11
{6,7}
HIDS 10.1.9.2, linuxconf
10.1.9.2 21:3/21:4
Meta-Alert 10
{4,8}
{NIDS1,NIDS2}
10.1.9.2, port:80 67.6.1.0
09:0/19:0 Meta-Alert
9
{1,2}
correlated {NIDS1,NIDS2}
10.1.9.2 67.6.1.0
09:0/13:9 Meta-Alert
8
HIDS HIDS APPL NIDS1 NIDS1 NIDS1 NIDS2 Sensor
irrelevant 10.1.9.2, port:80
20.9.0.1 11:5/11:5
IIS Exploit 3
correlated 10.1.9.2, linuxconf
10.1.9.2 21:4/21:4
Local Exploit 7
correlated 10.1.9.2, linuxconf
10.1.9.2 21:3/21:3
Local Exploit 6
10.1.9.2, Apache 10.1.9.2
19:1/19:1 Bad Request
5
correlated 10.1.9.2, port:80
67.6.1.0 19:0/19:0
Apache Exploit 4
10.1.9.2 67.6.1.0
09:0/14:1 Portscan
2
10.1.9.2 67.6.1.0
09:1/13:9 Portscan
1
Tag Dest IPs
Src IPs Start/End
Signature ID
Linking network-based to host-based alerts
Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification
Thread Reconstruction
Attack Session Reconstruction
Focus Recognition Multi-Step
Correlation Impact
Analysis Prioritization
Intrusion Reports
Sensor Ontology Databases
Asset Database
Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.
Alert Collection Alert Aggregation & Verification
High-Level Alert Structures
Attack Focus Recognition
Attack Focus Recognition
• To identify hosts that are either source or the target of a substantial amount of attacks.
• Effective in reducing the number of alerts caused by DDoS and portscan activity.
• Example: Several portscan alerts against
multiple targets from the same source, alerts
would be merged into a one2many meta-alert.
Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification
Thread Reconstruction
Attack Session Reconstruction
Focus Recognition Multi-Step
Correlation Impact
Analysis Prioritization
Intrusion Reports
Sensor Ontology Databases
Asset Database
Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.
Alert Collection Alert Aggregation & Verification
High-Level Alert Structures
Multi Step Correlation
Multistep Correlation
{10,11}
{NIDS1,NIDS2,A PPL,HIDS}
10.1.9.2, port:80, Apache, linuxconf {67.6.1.0
,10.1.9.2}
09:0/21:4 Meta-Alert
12
{5,9}
correlated {NIDS1,NIDS2,A
PPL}
10.1.9.2, port:80, Apache
{67.6.1.0 ,10.1.9.2}
09:0/19:1 Meta-Alert
11
{6,7}
correlated HIDS
10.1.9.2, linuxconf 10.1.9.2
21:3/21:4 Meta-Alert
10
{4,8}
{NIDS1,NIDS2}
10.1.9.2, port:80 67.6.1.0
09:0/19:0 Meta-Alert
9
{1,2}
correlated {NIDS1,NIDS2}
10.1.9.2 67.6.1.0
09:0/13:9 Meta-Alert
8
HIDS HIDS APPL NIDS1 NIDS1 NIDS1 NIDS2 Sensor
irrelevant 10.1.9.2, port:80
20.9.0.1 11:5/11:5
IIS Exploit 3
correlated 10.1.9.2, linuxconf
10.1.9.2 21:4/21:4
Local Exploit 7
correlated 10.1.9.2, linuxconf
10.1.9.2 21:3/21:3
Local Exploit 6
10.1.9.2, Apache 10.1.9.2
19:1/19:1 Bad Request
5
correlated 10.1.9.2, port:80
67.6.1.0 19:0/19:0
Apache Exploit 4
10.1.9.2 67.6.1.0
09:0/14:1 Portscan
2
10.1.9.2 67.6.1.0
09:1/13:9 Portscan
1
Tag Dest IPs
Src IPs Start/End
Signature ID
Defined by using some form of expert knowledge (attack scenario)
Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification
Thread Reconstruction
Attack Session Reconstruction
Focus Recognition Multi-Step
Correlation Impact
Analysis Prioritization
Intrusion Reports
Sensor Ontology Databases
Asset Database
Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.
Alert Collection Alert Aggregation & Verification
High-Level Alert Structures
Impact Analysis
Impact Analysis
• To analyze alerts with regard to their impact on the network infrastructure and the attached
resources.
• Example:
– Dependency between mail services that
requires an operational domain name service
(DNS) to work properly.
Sensor Alerts Normalization Pre-Processing Alert Fusion Alert Verification
Thread Reconstruction
Attack Session Reconstruction
Focus Recognition Multi-Step
Correlation Impact
Analysis Prioritization
Intrusion Reports
Sensor Ontology Databases
Asset Database
Sources: Kruegel et.al, Intrusion Detection and Correlation Challenges and Solution.
Alert Collection Alert Aggregation & Verification
High-Level Alert Structures
Alert Prioritization
Prioritization
{11,10}
HIGH Multistep Attack Scenario
Meta-Alert 12
{9,5}
correlated LOW
Remote Attack Session Meta-Alert
11
{6,7}
correlated LOW
Local Attack Thread Meta-Alert
10
{8,4}
correlated LOW
Remote Attack Thread Meta-Alert
9
{2,3}
correlated LOW
Fused Portscan Meta-Alert
8
correlated correlated correlated correlated Irrelevant correlated correlated Tag
LOW IIS Exploit
3
LOW Local Exploit
7
LOW Local Exploit
6
LOW Bad Request
5
LOW Apache Exploit
4
LOW Portscan
2
LOW Portscan
1
Ref Tag Priority
Description Signature
ID