Towards a taxonomy of intrusion-detection systems

نویسندگان

  • Hervé Debar
  • Marc Dacier
  • Andreas Wespi
چکیده

Intrusion detection systems aim at detecting attacks against computer systems and networks or against information systems in general as it is di cult to provide provably secure information systems and maintain them in such a secure state for their entire lifetime and for every utilization Sometimes legacy or operational con straints do not even allow a fully secure information system to be realized at all Therefore the task of intrusion detection systems is to monitor the usage of such systems and to detect the apparition of insecure states They detect attempts and active misuse by legitimate users of the information systems or external parties to abuse their privileges or exploit security vulnerabilities In this paper we introduce a taxonomy of intrusion detection systems that highlights the various aspects of this area This taxonomy de nes families of intrusion detection systems according to their properties It is illustrated by numerous examples from past and current projects

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection Systems: A Survey and Taxonomy

This paper presents a taxonomy of intrusion detection systems that is then used to survey and classify a number of research prototypes. The taxonomy consists of a classification first of the detection principle, and second of certain operational aspects of the intrusion detection system as such. The systems are also grouped according to the increasing difficulty of the problem they attempt to a...

متن کامل

SCADA-specific Intrusion Detection/Prevention Systems: A Survey and Taxonomy

Due to standardization and connectivity to the Internet, Supervisory Control and Data Acquisition (SCADA) systems now face the threat of cyber attacks. SCADA systems were designed without cyber security in mind and hence the problem of how to modify conventional Information Technology (IT) intrusion detection techniques to suit the needs of SCADA is a big challenge. We explain the nuance associ...

متن کامل

Towards a Taxonomy of Intrusion Detection Systems and Attacks

In recent years, an increasing number of intrusion-detection systems (IDSes) have become available [Sobire98]. This development has been driven, among other things, by the growing number of computer security incidents [CIN0799, Gross97, Howard97, Kumar95, LSMTTF98, Neuman98b, NeuPar89] which have highlighted the need for organizations to protect their networks against adversaries [Sundar96]. Th...

متن کامل

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Networks

دوره 31  شماره 

صفحات  -

تاریخ انتشار 1999