An Overview of IDS Using Anomaly Detection

نویسندگان

  • Lior Rokach
  • Yuval Elovici
چکیده

Intrusion detection is the process of monitoring and analyzing the events occurring in a computer system in order to detect signs of security problems. The problem of intrusion detection can be solved using anomaly detection techniques. For instance, one is given a set of connection data belonging to different classes (normal activity, different attacks) and the aim is to construct a classifier that accurately classifies new unlabeled connections data. Clustering methods can be used to detect anomaly in data which might implies intrusion of a new type. This chapter gives a critical summary of anomaly detection research for intrusion detection. This chapter surveys a list of research projects that apply anomaly detection techniques to intrusion detection. Finally some directions for research are given. IntroductIon One of the most practical forms of cyber warfare is penetrating a mission-critical information system or any other critical infrastructure, and maliciously affecting its availability, confidentiality, or integrity. While the popularity of the Internet increases, more organizations are becoming vulnerable to a wide variety of cyber attacks. Thus, organizations employ various computer and network security solutions to make their information systems tolerant of such threats. One of the solutions is intrusion detection and prevention systems. Intrusion detection is the process of monitoring and analyzing the events occurring in a computer system and communication networks in order to detect signs of security breaches. A complete intrusion detection system (IDS) might monitor network traffic, server and operatAn Overview of IDS Using Anomaly Detection ing system events, and file system integrity, using both signature detection and anomaly detection at each level. Mahoney and Chan (2002) distinguish between a host based IDS, which monitors the state of the host and a network IDS, which monitors traffic to and from the host. These systems differ in the types of attacks they can detect. A network IDS can monitor multiple hosts on a local network. On the other hand, a host based system must be installed on the system it monitors. A host based system may, for example, detect user-to-root (U2R) attacks, where a certain user gains the privileges of another user (usually root). A network IDS detects probes (such as port scans), denial-of-service (DOS) attacks (such as server floods), and remote-to-local (R2L) attacks in which an attacker without user level access gains the ability to execute commands locally. Also, because a network IDS monitors input (and output) rather than state, it can detect failed attacks (e.g., probes). There are two different approaches to intrusion detection: misuse detection and anomaly detection. Misuse detection is the ability to identify intrusions based on a known pattern for the malicious activity. These known patterns are referred to as signatures. These attack signatures encompass specific traffic or activity that is based on known intrusive activity. The reader is referred to the work of Axelsson (2000), for detailed taxonomy about IDSs. The second approach, anomaly detection, is the attempt to identify malicious activity based on deviations from established normal activity patterns. Usually anomaly detection is performed by creating a profile for each user group. These profiles are used as a baseline to define normal user activity. If any monitored activity deviates too far from this baseline, then the activity generates an alarm. Classic implementations of IDS are rule based (see Roesch, 1999). The system administrator is responsible to write a set of rules, for example, to reject any packet addressed to a nonexistent host, or to restrict services to a range of trusted addresses. However, keeping the rules updated by monitoring the traffic to determine normal behavior is challenging. Both types of intrusion detection systems can be benefit from using data mining techniques as will be shown later in the chapter.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...

متن کامل

Object - Relational Modeling

DTD Graph from an XML Document: A Reverse Engineering Approach Joseph Fong and Herbert Shiu (2010). Principle Advancements in Database Management Technologies: New Applications and Frameworks (pp. 204-224). www.igi-global.com/chapter/abstract-dtd-graph-xml-document/39357?camid=4v1a A Study of a Generic Schema for Management of Multidatabase Systems Shirley A. Becker, Rick Gibson and Nancy L. Le...

متن کامل

Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

Network packet payload analysis for intrusion detection

This paper explores possibility of detecting intrusions into computer networks using network packet payload analysis. Quick overview of current IDS state of the art is given. Issues with IDS are explained. Integrated approach to IDS building is suggested. Anomaly detection process improvements are recomended. Current prevailing methods for network intrusion detection based on packet meta data, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009