Cooperative intrusion detection model based on scenario

被引:0
|
作者
Teng, Shaohua [1 ]
Zhang, Wei [1 ]
Fu, Xiufen [1 ]
Tan, Wenwei [1 ]
机构
[1] Guangdong Univ Technol, Guangzhou, Peoples R China
关键词
CSCW; scenario; intrusion detection; state transition;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
When a new intrusion means is developed, many intrusion methods can be derived by exchanging the command sequences or by replacing commands with the functionally similar commands, which makes the detection of the developed intrusion very difficult. To overcome this problem, a cooperative intrusion detection model based on scenario is proposed, which is consisted of 5 layers. Topological order, isomorphic transformation and state transition analysis method are applied in the text. For an intrusion case we generate all the possible derived intrusions as an intrusion base. Based on this intrusion base, we present an efficient method to detect such intrusions by using finite automaton. Further, we apply data fusion to analysis suspicious data. A derived intrusion can he seen as an unknown intrusion, in this sense the technique presented in this paper can detect some unknown intrusions.
引用
收藏
页码:876 / +
页数:2
相关论文
共 50 条
  • [1] A Cooperative Intrusion Detection Model Based on Granular Computing
    Zhang, Wei
    Teng, Shaohua
    Fu, Xiufen
    Fan, Jihui
    Teng, Yi
    Zhu, Haibin
    PROCEEDINGS OF THE 2013 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2013, : 325 - 331
  • [2] Cooperative Intrusion Detection Model Based on State Transition Analysis
    Teng, Shaohua
    Zhang, Wei
    Fu, Xiufen
    Wu, Naiqi
    COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN IV, 2008, 5236 : 419 - 431
  • [3] The Research of a Cooperative Model Intrusion Detection System
    Zhu Qiang
    Shun Yuqiang
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 510 - 513
  • [4] Ontology based cooperative intrusion detection system
    He, YX
    Chen, W
    Yang, M
    Peng, WL
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2004, 3222 : 419 - 426
  • [5] Population-based cooperative artificial lymphocyte model for network intrusion detection
    An, Hui-Yao
    Wu, Ze-Jun
    Wang, Xin-An
    Wang, Xiu-Yun
    Tongxin Xuebao/Journal on Communications, 2010, 31 (09): : 122 - 130
  • [6] A Cooperative Intrusion Detection Model for Cloud Computing Networks
    Teng, Shaohua
    Zheng, Chaoyu
    Zhu, Haibin
    Liu, Dongning
    Zhang, Wei
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 107 - 118
  • [7] A cooperative network intrusion detection based on fuzzy SVMs
    Teng S.
    Du H.
    Wu N.
    Zhang W.
    Su J.
    Journal of Networks, 2010, 5 (04) : 475 - 483
  • [8] A cooperative intrusion detection system based on autonomous agents
    Yongle, D
    Jun, Q
    Meilin, S
    CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 861 - 863
  • [9] Scenario recognition based on collaborative attack modeling in intrusion detection
    Liu, Xuejiao
    Xiao, Debao
    Gu, Ting
    Xu, Hui
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 378 - 382
  • [10] Using vulnerability analysis to model attack scenario for collaborative intrusion detection
    Liu, Xuejiao
    Xiao, Debao
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1273 - 1277