Going Beyond Behavior-Based Intrusion Detection
نویسنده
چکیده
Today's Intrusion Detection (ID) ideas focus on two solutions: detecting intrusions based on known vulnerabilities and detecting anomalies in the normal " behavior " in a particular system, be it the network or the host. Although not immune from false-positives or true-negatives, these systems do a lot for ID, but the damage from unknown attacks is more substantial as people deploy these systems and let their guards down. This paper attempts to see if a guarantee of security can be asserted in two popular ID areas: Host-Based ID and Denial of Service ID on the network. First, we explore what capability systems can do for Hosts and then explore the newer methods of Denial of Service source identification. These ideas have the potential to do much more than unreliable dependencies on behavior based Intrusion Detection.
منابع مشابه
Security Patterns for Intrusion Detection Systems
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion or denial of service attacks. These intrusions may bring all kinds of misuses. Intrusion Detection Systems (IDS) play a very important role in the security of today's networks by detecting when an attack is happening. IDS have evolved into an integral part of network security which monitors the netwo...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملIntrusion Detection for an On-Going Attack
An intrusion-detection system (IDS) for an on-going attack is described. Prior to an attack, an IDS operates in anticipation of a general threat. During an attack, the IDS can deal less in the general and more in the particularnamely, particulars about attackers and attacked devices. A profile of the attacker is developed, using information he reveals about himself during his attacks. Principle...
متن کاملDesigning an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic
One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003