A proposal of protocol and policy-based intrusion detection system

被引:0
|
作者
Baba, T [1 ]
Matsuda, S [1 ]
机构
[1] NTT Data Corp, Res & Dev Headquarters, Chuo Ku, Tokyo 1040033, Japan
关键词
intrusion detection; IDS; network security; neural network; damage prediction;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, intrusion detection systems (IDSs) are widely deployed in enterprise networks for detecting network attacks. Most existing commercial IDSs are based on misuse detection model. In misuse detection, although known attacks can be detected, unknown attacks cannot be detected because attack signatures for unknown attacks cannot be generated. In this paper, we propose a method for detecting network attacks including unknown ones against servers such as web servers, mail servers, FTP servers, and DNS servers, using protocol specifications and site access policy. Furthermore, we propose a method to predict damage from detected attacks using neural networks.
引用
收藏
页码:365 / 370
页数:6
相关论文
共 50 条
  • [11] Designing of policy-based negotiation protocol on MANET
    Pornavalai, Chotipat
    Srifa, Nualpam
    Varakulsiripuntht, Ruttikorn
    2006 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES,VOLS 1-3, 2006, : 343 - +
  • [12] Research on Distributed Intrusion Detection System Based on Protocol Analysis
    Qu, Xiaohong
    Liu, Zhijie
    Xie, Xiaoyao
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 421 - 424
  • [13] Protocol Reconfiguration Schemes for Policy-based Equipment Management
    Patouni, Eleni
    Lilis, Antonis
    Merentitis, Andreas
    Alonistioti, Nancy
    Beaujean, Christophe
    Bourse, Didier
    Nicollet, Eric
    2006 IEEE 64TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 2881 - +
  • [14] Policy-based workflow management system
    Chen, S
    Ouyang, S
    Hassana, GK
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2005, 3739 : 804 - 809
  • [15] Intrusion Detection System in UDP Protocol
    Duraiswamy, K.
    Palanivel, G.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (03): : 1 - 5
  • [17] A policy-based network management system
    Bhatia, R
    Kohli, M
    Lobo, J
    Virmani, A
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL I AND II, 1999, : 465 - 471
  • [18] Policy-Based Spam Detection of Tweets Dataset
    Dar, Momna
    Iqbal, Faiza
    Latif, Rabia
    Altaf, Ayesha
    Jamail, Nor Shahida Mohd
    ELECTRONICS, 2023, 12 (12)
  • [19] Towards privacy enhancement in policy-based system
    Khurat, Assadarat
    Abendroth, Joerg
    WSEAS Transactions on Information Science and Applications, 2007, 4 (03): : 576 - 583
  • [20] Intrusion Detection of Industrial Control System based on Modbus TCP Protocol
    Wang Yusheng
    Fan Kefeng
    Lai Yingxu
    Liu Zenghui
    Zhou Ruikang
    Yao Xiangzhen
    Li Lin
    2017 IEEE 13TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS (ISADS 2017), 2017, : 156 - 162