Recent developments in network intrusion detection [guest editorial]
نویسندگان
چکیده
GUEST EDITORIAL bout 20 years ago in November 1988, the Morris worm spread through the Internet, taking down thousands of computers. The incident prompted the U.S. Defense Advanced Research Programs Agency to establish the CERT/CC to coordinate activities to defend against future Internet security problems, and was one of the first media stories to raise public awareness about network security. Security problems with the TCP/IP protocol suite were known (as noted by Steven Bellovin), but the Inter-net was a closed network for academics and researchers at the time. Spam and malware were minor problems, and the Web had not been invented. Security was understandably not one of the high priority concerns of the Internet designers 20 years ago, but the consequences of an open public Internet are now apparent. Today network security has become an everyday problem with virtually all computers connected to the Internet. The average Internet user must be constantly vigilant against a number of network threats such as spam, worms, Trojan horses , bots, spyware, and phishing. Enterprises are forced to fortify their networks against remote intrusions into their servers and databases. Governments are concerned about espionage and the possibility of cyberwarfare. Intrusion detection has been a critical component of network security since the 1980s. It is not realistic to expect that all attacks can be blocked by firewalls, access control lists, and other defenses. Intrusion detection serves the important function of identifying malicious activities and determining their nature, origin, and seriousness. Network-based and host-based intrusion detection methods commonly use a combination of signatures to recognize known attacks and anomaly detection to recognize suspicious behaviors. This Special Issue is intended to present the state of the art in network-based intrusion detection. Although an enormous literature already exists, intrusion detection is a dynamic problem demanding constant research progress to keep up with new exploits, new evasion techniques, and increasing traffic rates. In response to the open call, we were pleased to receive 44 submissions from which six articles were accepted for this issue. The large number of submissions attests to the vitality of research efforts and high interest level in intrusion detection. Intrusion detection is a problem well suited to intelligent sampling. Intrusion detection systems must observe a great amount of traffic (gigabits per second) looking for anomalies, but the vast majority of flows are normal and uninteresting. The first article in this special issue, " Network Anomaly …
منابع مشابه
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...
متن کاملتولید خودکار الگوهای نفوذ جدید با استفاده از طبقهبندهای تک کلاسی و روشهای یادگیری استقرایی
In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
متن کاملMoving dispersion method for statistical anomaly detection in intrusion detection systems
A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Network
دوره 23 شماره
صفحات -
تاریخ انتشار 2009