A security policy and Network Cartography based Intrusion Detection and Prevention Systems

被引:0
作者
Meharouech, Sourour [1 ]
Bouhoula, Adel [1 ]
Abbes, Tarek [1 ]
机构
[1] Higher Sch Telecommun SupCom, Dept Comp Sci & Networks, Digital Secur unit, Cit El Ghazala 2083, Tunisia
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2009年 / 4卷 / 04期
关键词
Network security; Intrusion Detection System; Intrusion Prevention System; Security Policy; Network cartography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During this time when Internet provides essential communication between an infinite numbers of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are now considered a mainstream security technology. IDS and IPS are designed to identify security breaches. However, one of the most problems with current IDS and IPS is the lack of the "environmental awareness" (i.e. security policy, network topology and software). This ignorance triggers many false positives and false negatives. a false negative is corresponding to a non-detected attack and it occurs because an attacker is misclassified as a normal user. A false positive is corresponding to a false alert and it occurs because the IDS/IPS misinterprets normal packets or activities as attacks. In this paper, we propose a novel intrusion detection and prevention architecture where we integrate the characteristics and the properties of the protected system in the traffic analysis process. Our solution has been verified in IDS and IPS system and achieved a significant reduction in the number of false positives and false negatives.
引用
收藏
页码:279 / 291
页数:13
相关论文
共 22 条
  • [1] Afonso Joao, 2006, DEV INTEGRATED SOLUT
  • [2] ALMGREN M, 2001, LECT NOTES COMPUTER
  • [3] Beckers Johan, 2003, ADV ANAL INTRUSION D
  • [4] Benjamin Morin, 2002, LECT NOTES COMPUTER, V2516, P115
  • [5] Blanc Mathieu, P 15 IEEE INT S SOFT
  • [6] COHEN F, 1999, SIMULATING CYBER ATT
  • [7] CURRY D, 2001, INTRUSION DETECTION
  • [8] Gordon L. A., 2004, 9 ANN CSI FBI COMPUT
  • [9] Julish K., 2002, 3398 IBM RZ
  • [10] A system architecture for high-speed deep packet inspection in signature-based network intrusion prevention
    Kim, Sunil
    Lee, Jun-yong
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2007, 53 (5-6) : 310 - 320