Title
DSS for computer security incident response applying CBR and collaborative response
Abstract
Recently, as hacking attempts increase dramatically; most enterprises are forced to employ some safeguards for hacking proof. For example, firewall or IPS (Intrusion Prevention System) selectively accepts the incoming packets, and IDS (Intrusion Detection System) detects the attack attempts from network. The latest version of firewall works in cooperation with IDS to immediately response to hacking attempts. However, it may make false alarms that misjudge normal traffic as hacking traffic and cause network problems to block the normal IP address by false alarms. By these false alarms made by IDS, system administrators or CSOs make wrong decisions and important data may be exposed or the availability of network or server system may be exhausted. Therefore, it is important to minimize the false alarms. As a way of minimizing false alarms and supporting adequate decisions, we suggest the RFM (Recency, Frequency, Monetary) analysis methodology, which analyzes log files with incorporating three criteria of recency, frequency and monetary with statistical process control chart, and thus leads to an intuitive detection of anomaly and misuse events. Moreover, to cope with hacking attempts proactively, we apply CBR (case based reasoning) to find out similarities between already known hacking patterns and new hacking patterns. With the RFM analysis methodology and CBR, we develop DSS which can minimize false alarms and decrease the time to respond to hacking events. In case that RFM analysis module finds out unknown viruses or worms occurred, this CBR system matches the most similar incident case from case-based database. System administrators can easily get information about how to fix and how we fixed in similar cases. And CSOs can build a blacklist of frequently detected IP addresses and users. This blacklist can be used for incident handling. Finally, we propose collaborative incident response system with DSS, this distributed agent systems interactively exchange the suspicious users and source IP addresses data and decide who is true-anomalous users and which IP addresses is the most riskiest and then deny all connections from that users and IP addresses automatically with less false-positives.
Year
DOI
Venue
2010
10.1016/j.eswa.2009.05.100
Expert Syst. Appl.
Keywords
Field
DocType
hacking attempt,collaborative response,cbr system,rfm analysis methodology,false alarm,hacking traffic,anomaly detection,hacking proof,cbr (case based reasoning),misuse detection,hacking event,log analysis,hacking attempts proactively,computer security incident response,system security,expert system,ip address,decision support system,system administrator,new hacking pattern,intrusion detection system,statistical process control,false positive,case base reasoning,intrusion prevention system,computer security,database system
Anomaly detection,Data mining,Firewall (construction),Computer security,Computer science,Decision support system,Blacklist,Network packet,Case-based reasoning,Misuse detection,Intrusion detection system
Journal
Volume
Issue
ISSN
37
1
Expert Systems With Applications
Citations 
PageRank 
References 
16
0.69
6
Authors
3
Name
Order
Citations
PageRank
Huy Kang Kim132940.32
Kwang Hyuk Im2756.31
Sang Chan Park348142.12