计算机与现代化

• 信息安全 • 上一篇    下一篇

一种基于信息熵的IDS告警预处理方法

  

  1. (1.贵州大学计算机科学与技术学院,贵州贵阳550025;2.贵州省公共大数据重点实验室,贵州贵阳550025;
    3.许昌学院信息工程学院,河南许昌461000)
  • 收稿日期:2019-12-26 出版日期:2020-05-20 发布日期:2020-05-21
  • 作者简介:张羽(1995-),女,贵州黄平人,硕士研究生,研究方向:网络与信息安全,E-mail: zy13985105565@163.com; 通信作者:郭春(1986-),男,湖南邵阳人,副教授,博士,研究方向:入侵检测,数据挖掘,E-mail: gc_gzedu@163.com; 申国伟(1986-),男,湖南邵东人,副教授,博士,研究方向:知识图谱,数据挖掘,E-mail: gwshen@gzu.edu.cn; 平源(1981-),男,重庆合川人,副教授,博士,研究方向:信息安全,机器学习,E-mail: pingyuan@bupt.edu.cn。
  • 基金资助:
    国家自然科学基金资助项目(61540049); 贵州省科技计划项目([2018]3001, [2017]1051, [2016]1052); 河南省科技攻关计划项目(182102210123); 河南省高校科技创新人才计划项目(18HASTIT022); 河南省高校青年骨干教师计划项目(2016GGJS-141)

An IDS Alerts Preprocessing Method Based on Information Entropy

  1. (1. College of Computer Science and Technology, Guizhou University, Guiyang 550025, China;
    2. Guizhou Provincial Key Laboratory of Public Big Data, Guiyang 550025, China;
    3. School of Information Engineering, Xuchang University, Xuchang 461000, China)
  • Received:2019-12-26 Online:2020-05-20 Published:2020-05-21

摘要: 针对目前入侵检测系统存在的海量重复告警、误报率偏高、告警质量低下等问题,提出一种基于信息熵的IDS告警预处理方法,用于减少误告警,聚合相似告警,生成代表单步攻击意图的超告警。首先,对IDS告警进行特征提取,用告警密度、告警周期值、源IP对应的目的IP数与攻击源威胁度这4个特征的信息熵融合结果表示一条告警所具有的特征信息量。通过与误告警的特征向量进行互雷尼信息熵的计算,从而识别出误告,并且去除误告。然后对误告去除后的告警按照IP对应关系,划分为2类:一种源IP对应一种目的IP的告警以及一种源IP对应多种目的IP的告警。分别对2类告警进行特征统计,构造5维特征信息熵向量,采用DBSCAN算法将信息量相同或者相似的告警进行聚类。最后对各个类别的告警进行动态时间窗口划分,并构建出代表单步攻击意图的超告警。实验结果表明,基于信息熵的告警预处理方法误告去除率为87.43%,告警聚合率达到98.63%,具有较好的误告去除效果以及较高的告警聚合率。

关键词: 入侵检测系统, 误告去除, 告警聚合, 互雷尼信息熵, 聚类

Abstract: Focus on the issue for the large number of repeated alerts, high false alert rate, and low alert quality of the current intrusion detection system, an IDS alerts preprocessing method based on information entropy is proposed to reduce false alerts, aggregate similar alerts, and generate super alerts that represent the intent of a single step attack. First, the feature extraction of the IDS alerts are performed. The information entropy fusion result of the four characteristics of the alert density, the alert period value, the source IP address corresponding destination IP address numbers, and the attack source threat degree indicates the amount of feature information that an alert has. By calculating the Rainey information entropy with the feature vector of the false alert, the false alert is recognized and removed. Then, the alerts that the false alerts have been removed are classified into two types according to the IP correspondence: one type of source IP address corresponding to one destination IP address and one source IP address corresponding to multiple destination IP addresses. The two types of alert features are counted separately, and the 5-dimensional feature information entropy vectors are constructed. The DBSCAN algorithm is used to cluster the alerts with the same or similar information. Finally, the dynamic time windows are divided for each category of alerts, and the super alerts that represent the intention of single-step attacks are constructed. The experimental results show that the alerts preprocessing method based on information entropy has a false alert reduction rate of 87.43% and an alert aggregation rate of 98.63%, which has a good false alert reduction effect and a high alert aggregation rate.

Key words: intrusion detection system, false alerts reduction, alerts aggregation, Rainey information entropy, clustering

中图分类号: