Alert Prioritization in Intrusion Detection Systems Khalid Alsubhi , Ehab Al-Shaer , and Raouf Boutaba ( )Davird R. Cheriton School of Computer Science, University of Waterloo, Canada ( )School of Computer Science, DePaul University, Chicago, USA email: kaalsubh@cs.uwaterloo.ca; ehab@cs.depaul.edu; rboutaba@uwaterloo.ca Abstract—Intrusion Detection Systems (IDSs) are designed to monitor user and/or network activity and generate alerts when- ever abnormal activities are detected. The number of these alerts can be very large; making the task of security analysts difficult to manage. Furthermore, IDS alert management techniques, such as clustering and correlation, suffer from involving unrelated alerts in their processes and consequently provide imprecise results. In this paper, we propose a fuzzy-logic based technique for scoring and prioritizing alerts generated by an IDS (1) . In addition, we present an alert rescoring technique that leads to a further reduction of the number of alerts. The approach is validated using the 2000 DARPA intrusion detection scenario specific datasets and comparative results between the Snort IDS alert scoring and our scoring and prioritization scheme are presented. Index Terms—Alert management, alert prioritization I. I NTRODUCTION Network attacks are growing more serious, forcing system defenders to deploy appropriate security devices such as firewalls, Information Protection Systems (IPSs), and Intrusion Detection Systems (IDSs). An IDS is aimed to inspect user and/or network activity looking for suspicious behavior that they report to security analysts in the form of alerts. There are two common types of IDSs depending on the method employed for traffic inspection: signature-based and anomaly- based. A Signature-based IDS generates an alert when the traffic contains a pattern that matches signatures of malicious or suspicious activities. An anomaly-based IDS examines ongoing activity and detects attacks based on the degree of variation from normal past behavior [4]. However, both of these mechanisms suffer from the problem of generating a large number of alerts. These alerts need to be evaluated by security analysts before any further investigation in order to take appropriate actions against the attacks. IDSs usually generate a large number of alerts whenever abnormal activities are detected. Inspecting and investigating all reported alerts manually is a difficult, error-prone, and time-consuming task. In addition, ignoring alerts may result into successful attacks being missed. To tackle this problem, low-level and high-level alert evaluation operations have been introduced. Low-level alert operations deal with each alert individually to enrich its attributes or assign a score to it based on the potential risk. High-level alert management techniques, such as aggregation, clustering, correlation, and 1 This research has been supported under the Natural Science & Engineering Research Council of Canada (NSERC) grant STP-322235-05. fusion, were proposed to deal with sets of alerts and provide an abstraction of them. However, the high-level techniques suffer from including alerts that are not significant, which leads to inappropriate results. Therefore, low-level evaluation techniques are needed to automatically (or semi-automatically) examine large numbers of alerts and prioritize them, leaving only important alerts for further inspection. Accordingly, the reduced set of alerts leads to more precise high-level alert analysis. From this work, the security administrator will be provided with an effective technique to evaluate and manage alerts, thereby saving his or her time and effort. This paper describes a method for automatically evaluating IDS alerts based on metrics related to the applicability of the attack, the importance of victim, the relationship between the alert under evaluation and previous alerts, and the social activities between the attackers and the victims. These metrics are input of a Fuzzy logic system in order to investigate the seriousness of the generated alerts and assign a score to each of them. This evaluation process will prioritize alerts when presented to the security administrator for further investigation. Additionally, we propose a rescoring technique to dynamically rescore alerts based on the relationship between attacks or the degree of maliciousness of an attacker. Finally, we validate our proposal by two experiments. In the first experiment, we score alerts generated by the Snort IDS [28] using 2000 DARPA intrusion detection scenario specific datasets [15]. In the second experiment, we use the same dataset to validate our rescoring technique. The paper is organized as follows. Section II discusses related works. Section III describes our proposed alert pri- oritization system. Section IV presents the identified alert prioritization metrics. Section V explains fuzzy logic inference and its use in this work. Section VI explains the technique for alert rescoring. Simulation results are presented and discussed in Section VII. Finally, Section VIII concludes the paper. II. RELATED WORK Attacks are presented to a security administrator through alerts generated by the sensing devices, such as IDSs. It is common that an IDS generates a large number of alerts whenever the defined policies (rules) have been matched. With a large number of alerts, security administrators are overwhelmed and it becomes difficult to manually distinguish between the real attacks and the false ones. Two general 978-1-4244-2066-7/08/$25.00 ©2008 IEEE 33