Intrusion Event Correlation System
First Claim
1. A system comprising:
- a) an attack graph generator configured to construct an attack graph for a network by mapping interdependencies among a multitude of exploits with respect to a multitude of conditions on a multitude of processing machines in said network, at least one of said multitude of exploits including at least one precondition mapped to at least one postcondition, said multitude of conditions including at least one of said at least one precondition and at least one of said at least one postcondition;
b) an exploit distance calculator configured to determine exploit distances for at least one exploit pair, each of said at least one exploit pair being a pair of said multitude of exploits on said attack graph;
c) an intrusion detector configured to generate a multitude of event reports, each of said multitude of event reports used to report detected intrusions;
d) an event report/exploit associator configured to associate each of said multitude of event reports with at least one of said multitude of exploits;
e) an event graph creator configured to create an event graph by mapping at least one of said multitude of event reports to at least one other of said multitude of event reports;
f) an event graph distance calculator configured to determine event graph distances for at least one event pair, each of said at least one event pair being a pair of said multitude of event reports on said event graph;
g) a correlation value calculator configured to calculate a multitude of correlation values, each of said multitude of correlation values calculated for at least one of said at least one event pair using said event graph distances; and
h) a coordinated attack analyzer configured to look for coordinated attacks by analyzing said multitude of correlation values using a correlation threshold.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
-
Citations
11 Claims
-
1. A system comprising:
-
a) an attack graph generator configured to construct an attack graph for a network by mapping interdependencies among a multitude of exploits with respect to a multitude of conditions on a multitude of processing machines in said network, at least one of said multitude of exploits including at least one precondition mapped to at least one postcondition, said multitude of conditions including at least one of said at least one precondition and at least one of said at least one postcondition; b) an exploit distance calculator configured to determine exploit distances for at least one exploit pair, each of said at least one exploit pair being a pair of said multitude of exploits on said attack graph; c) an intrusion detector configured to generate a multitude of event reports, each of said multitude of event reports used to report detected intrusions; d) an event report/exploit associator configured to associate each of said multitude of event reports with at least one of said multitude of exploits; e) an event graph creator configured to create an event graph by mapping at least one of said multitude of event reports to at least one other of said multitude of event reports; f) an event graph distance calculator configured to determine event graph distances for at least one event pair, each of said at least one event pair being a pair of said multitude of event reports on said event graph; g) a correlation value calculator configured to calculate a multitude of correlation values, each of said multitude of correlation values calculated for at least one of said at least one event pair using said event graph distances; and h) a coordinated attack analyzer configured to look for coordinated attacks by analyzing said multitude of correlation values using a correlation threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification