Analytical Techniques Development for a Statistical Intrusion Detection System (sids) Based on Accounting Records. Technical Report, 3.8 Clyde Digital Systems' Audit

نویسندگان

  • D. E. Denning
  • D. L. Edwards
  • R. Jagannathan
  • T. F. Lunt
  • James P. Anderson
  • Alan Whitehurst
چکیده

A prototype IDES|a real-time intrusion detection expert system. 16 Auditing can be controlled by VMS-format keyboard commands or from programs. Audit allows analysis of the audit data by random sampling or through selective analysis based on the system manager's knowledge of external events. Audit's analysis produces three reports: a security summary report, which summarizes the activity of high-risk users (as deened by a predetermined set of 14 risk factor tests and a programmable set of weighting parameters); a security event report, which summarizes the events that caused those users to be considered high-risk; and a supporting data report, which includes data from the audit log to support the conclusions of the rst two reports. The risk factors for which Audit tests include sessions outside business hours or on weekends or holidays (the deenition of normal business hours and holidays can be selected by the system manager); sessions indicating use of the AUTHORIZE or SYSGEN utilities; sessions indicating browsing; le access alarms; other alarms (alarms can be established for certain activities); repeated unsuccessful login attempts; sessions with dial-up or remote terminals; simultaneous logins for the same user; and attempts to turn oo auditing. Some of Audit's 14 tests use data contained in the audit logs, and some use information from the VMS operator log le; no test uses data from both. The operator log le is used to test for le access alarms, other alarms, login failures, and attempts to turn oo auditing. The other tests use the audit logs. Each of the 14 tests has an associated weight and three factors. One factor is for after-hour use; one factor is for activity from a dial-up terminal; and one factor is for activity from a DECnet remote terminal. Whenever an event satisses one of the tests, its weight is multiplied by its relevant factors and the result is added to the score for that user. Users with suuciently high scores are considered to be high-risk. The weights and factors can be selected by the system manager. The system manager can also add additional tests. There has been at least one published report of bypasses of certain Audit tests 21]. Allen Clyde reports that Audit has detected \numerous acts of misconduct, including criminal conduct ... on sensitive computer systems" 22]. 4 Conclusions None of the intrusion-detection approaches described is suucient alone|each addresses a diierent threat. A successful intrusion-detection system should incorporate several …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Audit Records Statistical Anomaly Detection Rule-based Intrusion Detection the Base-rate Fallacy Distributed Intrusion Detection Honeypots Intrusion Detection Exchange Format

20.1 Intruders Intruder Behavior Patterns Intrusion Techniques 20.2 Intrusion Detection Audit Records Statistical Anomaly Detection Rule-Based Intrusion Detection The Base-Rate Fallacy Distributed Intrusion Detection Honeypots Intrusion Detection Exchange Format 20.3 Password Management Password Protection Password Selection Strategies 20.4 Recommended Reading and Web Sites 20.5 Key Terms, Revi...

متن کامل

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

A Novel Intrusion Detection Systems based on Genetic Algorithms-suggested Features by the Means of Different Permutations of Labels’ Orders

Intrusion detection systems (IDS) by exploiting Machine learning techniques are able to diagnose attack traffics behaviors. Because of relatively large numbers of features in IDS standard benchmark dataset, like KDD CUP 99 and NSL_KDD, features selection methods play an important role. Optimization algorithms like Genetic algorithms (GA) are capable of finding near-optimum combination of the fe...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

Provide an optimal audit model to reduce fraudulent financial reporting

Fraud in financial reporting and accounting has grown significantly in recent years due to the financial crises created in companies, so that fraud has become a political and economic issue and today the legislature, the accounting profession and the causes The creation of fraud in it as well as the ways to deal with fraudulent behavior in financial statements have received special attention. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1988