can assign new meanings to these groups. The output is a lower number of alerts on
a higher semantic level (also called meta-alerts, [4, 1] e.a.). For example: independent
detections of strange network packets can be grouped and reinterpreted as one port scan.
A brief overview of correlation strategies is presented in Section 4.
The high-level alerts from the correlation component are then presented to the ad-
ministrator. Or, in the case of intrusion prevention systems that are able to actively react
to intrusions, the alerts can be fed to reactive components which then automatically
attempt to prevent the attack from resulting in an intrusion.
The correlation process, by presenting higher-level meta-alerts to the administrator
in stead of low-level sensor alerts, reduces the amount of alerts and is able to com-
plement them with diagnostic information. Some correlation methods are even able to
compensate for false negatives, by reasoning about attacks that might have been missed
by the IDS [5]. However, as mentioned, false and non-relevant positives still have a
negative impact on the correlation results.
Verification, as an intelligent pre-processing filter in the alert correlation process,
separates false and non-relevant alerts from true positives, so that the actual correlation
algorithms are provided with true positives only (in the ideal case). By enhancing the
quality of the alert stream, it is a useful addition to every IDS: it helps to handle the
first two IDS scalability issues and improves correlation results. Alert verification is
not able to solve the other scalability problems, however. First of all, verification does
not change the conceptual level of alerts. The low-level input alerts remain at their low
semantic level. Verification is also unable to take false negatives into account. These
issues are handled by the correlation process.
Individual sensors are generally insufficiently aware of the context to decide if an at-
tack is likely to be real and could have resulted in an intrusion. The verification process,
using information from the asset database or by actively probing systems or the net-
work, is not, and can make this distinction. In principle, even more contextual informa-
tion, like the security policy of a company, could be incorporated to distinguish between
attacks that the company does not deem important (i.e. port scanning an outside firewall)
and attacks that are. In this context, verification can be used as a partial replacement for
a priori policy tuning of IDS
1
.
Verification is able to handle intentionally generated false alerts, generated on pur-
pose by an attacker.
2
While all false alerts (both intentionally and unintentionally gen-
erated false positives, non-relevant positives) are detrimental to IDS, intentional alerts
should be especially avoided in intrusion prevention systems, as these systems are able
to actively try to prevent the attack from resulting in an intrusion. The prevention func-
tionality could be misused by an attacker to turn the IDS against legitimate users.
1
A priori policy tuning is the process of adjusting the configuration of an IDS, before deploy-
ment, to the security policy of an organization.
2
For example, if alerts are generated for port scans, an attacker could misuse nmap
(http://www.insecure.org/nmap/), a popular port scanner, to fake the originating address or
generate decoys (−S and −D options, respectively).