PEC: Post Event Correlation Tools for Network-Based Intrusion Detection

We describe and implement an approach to intrusion detection using data mining. We focus on analyzing network-based alert logs, and show how valuable information can be extracted from this data using an integrated collection of tools and technologies. These include data enhancement using topology information, event rate analysis, and temporal association. Applying these techniques on real data leads to a considerable reduction in false alarm rate while also allowing low frequency attack patterns and coordinated attacks from multiple sites to be detected.

By: Mark Mei, David A. George, Mark Brodie, Charu Aggarwal, Sheng Ma, Philip S. Yu

Published in: RC23011 in 2003

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rc23011.pdf

Questions about this service can be mailed to reports@us.ibm.com .