A proposal of protocol and policy-based intrusion detection system

被引:0
|
作者
Baba, T [1 ]
Matsuda, S [1 ]
机构
[1] NTT Data Corp, Res & Dev Headquarters, Chuo Ku, Tokyo 1040033, Japan
关键词
intrusion detection; IDS; network security; neural network; damage prediction;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, intrusion detection systems (IDSs) are widely deployed in enterprise networks for detecting network attacks. Most existing commercial IDSs are based on misuse detection model. In misuse detection, although known attacks can be detected, unknown attacks cannot be detected because attack signatures for unknown attacks cannot be generated. In this paper, we propose a method for detecting network attacks including unknown ones against servers such as web servers, mail servers, FTP servers, and DNS servers, using protocol specifications and site access policy. Furthermore, we propose a method to predict damage from detected attacks using neural networks.
引用
收藏
页码:365 / 370
页数:6
相关论文
共 50 条
  • [1] Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy
    George, Laurent
    Tong, Valerie Viet Triem
    Me, Ludovic
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 355 - 356
  • [2] Design of policy-based security management for intrusion detection
    Jo, SH
    Kim, JN
    Soh, SW
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 337 - 340
  • [3] Accurate and automated system call policy-based intrusion prevention
    Lam, Lap Chung
    Li, Wei
    Chiueh, Tzi-cker
    DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 413 - 422
  • [4] An improved reference flow control model for policy-based intrusion detection
    Zimmermann, J
    Mé, L
    Bidan, C
    COMPUTER SECURITY - ESORICS 2003, PROCEEDINGS, 2003, 2808 : 291 - 308
  • [5] Policy-Based Security Configuration Management Application to Intrusion Detection and Prevention
    Alsubhi, Khalid
    Aib, Issam
    Francois, Jerome
    Boutaba, Raouf
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 1051 - +
  • [6] A proposal of policy-based system architecture for grid services management
    Magaña, E
    Salamanca, E
    Serrat, J
    COMPUTATIONAL SCIENCE - ICCS 2004, PT 3, PROCEEDINGS, 2004, 3038 : 133 - 140
  • [7] Policy-based intrusion detection in web applications by monitoring Java information flows
    Hiet, Guillaume
    Tong, Valérie Viet Triem
    Mé, Ludovic
    Morin, Benjamin
    International Journal of Information and Computer Security, 2009, 3 (3-4): : 265 - 279
  • [8] Policy-Based Profiles for Network Intrusion Response Systems
    Hughes, Kieran
    McLaughlin, Kieran
    Sezer, Sakir
    2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 279 - 286
  • [9] Policy-Based Intrusion Detection in Web Applications by Monitoring Java']Java Information Flows
    Hiet, Guillaume
    Tong, Valerie Viet Triem
    Me, Ludovic
    Morin, Benjamin
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 53 - 60
  • [10] Protocol based foresight anomaly intrusion detection system
    Tsai, MK
    Lin, SC
    Tseng, SS
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 493 - 500