How to Systematically Classify Computer Security Intrusions

نویسندگان

  • Ulf Lindqvist
  • Erland Jonsson
چکیده

This paper presents a class@cation of intrusions with respect to technique as well as to result. The taxonomy is intended to be a step on the road to an established taxonomy of intrusions for use in incident reporting, statistics, warning bulletins, intrusion detection systems etc. Unlike previous schemes, it takes the viewpoint of the system owner and should therefore be suitable to a wider community than that of system developers and vendors only. It is based on data from a tzalistic intrusion experiment, a fact that supports the practical applicability of the scheme. The paper also discusses general aspects of classification, and introduces a concept called dimension. After having made a broad survey of previous work in thejield, we decided to base our classification of intrusion techniques on a scheme proposed by Neumann and Parker in I989 and to further refine relevant parts of their scheme. Our classification of intrusion results is derived from the traditional three aspects of computer security: confidentiality, availability and integrity.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Assessment of Different Classification Techniques for Intrusion Detection

Intrusion detection is one of the major research problems in network security. It is the process of monitoring and analyzing the events occurring in a computer system in order to detect different security violations. The aim of this paper is to classify activities of a system into two major categories: normal and abnormal activities. In this paper we present the comparison of different classifi...

متن کامل

An Expert System-Based Site Security Officer

A Site Security Officer (SSO) who is a network security staff that responds to alarms from an Intrusion Detection System (IDS), is always faced with the critical problem of low response time when the network becomes big. Even a skilled SSO is hard-pressed and less productive when collecting and analyzing IDS output manually as the frequency of intrusion increases. In this work, an Expert System...

متن کامل

Multiple behavior information fusion based quantitative threat evaluation

How to evaluate network security threat quantitatively is one of key issues in the field of network security, which is vital for administrators to make decision on the security of computer networks. A novel model of security threat evaluation with a series of quantitative indices is proposed on the analysis of prevalent network intrusions. This model is based on multiple behavior information fu...

متن کامل

Optimal Sampling for Class Balancing with Machine Learning Technique for Intrusion Detection System

Information security is becoming a more important issue in modern computer system. Intrusion Detection System (IDS) as the main security defensive technique that can effectively expand the scope of defense against network intrusion. Data Mining and Machine Learning techniques proved useful and attracted increasing attention in the network intrusion detection research area. Recently, many machin...

متن کامل

Current approaches to detecting intrusions

Before the flourishing of the Internet, computers were limited to the walls of the organization where computers were linked to each other but had little contact with computer systems outside. Now, we can reach farther, and can expose and link our computers to the entire world; however, such capabilities have made our privacy and assets vulnerable to cyber space attackers. Fortunately, attacks c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997