Albasheer, Hashim, Md Siraj, Maheyzah, Mubarakali, Azath, Elsier Tayfour, Omer, Salih, Sayeed, Hamdan, Mosab, Khan, Suleman, Zainal, Anazida and Kamarudeen, Sameer (2022) Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey. Sensors, 22 (4). e1494.
Preview |
PDF (Version of Record)
- Published Version
Available under License Creative Commons Attribution. 1MB |
Official URL: https://doi.org/10.3390/s22041494
Abstract
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterprise networks against cyber-attacks. However, NIDS networks suffer from several limitations, such as generating a high volume of low-quality alerts. Moreover, 99% of the alerts produced by NIDSs are false positives. As well, the prediction of future actions of an attacker is one of the most important goals here. The study has reviewed the state-of-the-art cyber-attack prediction based on NIDS Intrusion Alert, its models, and limitations. The taxonomy of intrusion alert correlation (AC) is introduced, which includes similarity-based, statistical-based, knowledge-based, and hybrid-based approaches. Moreover, the classification of alert correlation components was also introduced. Alert Correlation Datasets and future research directions are highlighted. The AC receives raw alerts to identify the association between different alerts, linking each alert to its related contextual information and predicting a forthcoming alert/attack. It provides a timely, concise, and high-level view of the network security situation. This review can serve as a benchmark for researchers and industries for Network Intrusion Detection Systems’ future progress and development.
Repository Staff Only: item control page