M2D2: A formal data model for IDS alert correlation. Morin, B., Mé, L., Debar, H., & Ducassé, M. In Wespi, A., Vigna, G., & Deri, L., editors, Proceedings of the 5th International Conference on Recent Advances in Intrusion Detection (RAID'02), volume 2516, of Lecture Notes in Computer Science, pages 115--137, Zurich, Switzerland, 2002. Springer-Verlag. 00262 bibtex: morin2002m2d2 bibtex[numpages=23;acmid=1754711]
M2D2: A formal data model for IDS alert correlation [link]Paper  doi  abstract   bibtex   
At present, alert correlation techniques do not make full use of the information that is available. We propose a data model for IDS alert correlation called M2D2. It supplies four information types: information related to the characteristics of the monitored information system, information about the vulnerabilities, information about the security tools used for the monitoring, and information about the events observed. M2D2 is formally defined. As far as we know, no other formal model includes the vulnerability and alert parts of M2D2. Three examples of correlations are given. They are rigorously specified using the formal definition of M2D2. As opposed to already published correlation methods, these examples use more than the events generated by security tools; they make use of many concepts formalized in M2D2.
@inproceedings{ morin_m2d2:_2002,
  address = {Zurich, Switzerland},
  series = {Lecture {Notes} in {Computer} {Science}},
  title = {M2D2: {A} formal data model for {IDS} alert correlation},
  volume = {2516},
  isbn = {3-540-00020-8},
  url = {http://link.springer.com/chapter/10.1007%2F3-540-36084-0_7},
  doi = {10.1007/3-540-36084-0<sub>7</sub>},
  abstract = {At present, alert correlation techniques do not make full use of the information that is available. We propose a data model for IDS alert correlation called M2D2. It supplies four information types: information related to the characteristics of the monitored information system, information about the vulnerabilities, information about the security tools used for the monitoring, and information about the events observed. M2D2 is formally defined. As far as we know, no other formal model includes the vulnerability and alert parts of M2D2. Three examples of correlations are given. They are rigorously specified using the formal definition of M2D2. As opposed to already published correlation methods, these examples use more than the events generated by security tools; they make use of many concepts formalized in M2D2.},
  booktitle = {Proceedings of the 5th {International} {Conference} on {Recent} {Advances} in {Intrusion} {Detection} ({RAID}'02)},
  publisher = {Springer-Verlag},
  author = {Morin, Benjamin and Mé, Ludovic and Debar, Hervé and Ducassé, Mireille},
  editor = {Wespi, Andreas and Vigna, Giovanni and Deri, Luca},
  year = {2002},
  note = {00262 bibtex: morin2002m2d2 
bibtex[numpages=23;acmid=1754711]},
  keywords = {Intrusion detection, alert correlation},
  pages = {115--137}
}

Downloads: 0