A proposal of protocol and policy-based intrusion detection system

被引:0
|
作者
Baba, T [1 ]
Matsuda, S [1 ]
机构
[1] NTT Data Corp, Res & Dev Headquarters, Chuo Ku, Tokyo 1040033, Japan
关键词
intrusion detection; IDS; network security; neural network; damage prediction;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, intrusion detection systems (IDSs) are widely deployed in enterprise networks for detecting network attacks. Most existing commercial IDSs are based on misuse detection model. In misuse detection, although known attacks can be detected, unknown attacks cannot be detected because attack signatures for unknown attacks cannot be generated. In this paper, we propose a method for detecting network attacks including unknown ones against servers such as web servers, mail servers, FTP servers, and DNS servers, using protocol specifications and site access policy. Furthermore, we propose a method to predict damage from detected attacks using neural networks.
引用
收藏
页码:365 / 370
页数:6
相关论文
共 50 条
  • [21] Enhancing System-Called-Based Intrusion Detection with Protocol Context
    Liu, Anyi
    Jiang, Xuxian
    Jin, Jing
    Mao, Feng
    Chen, Jim X.
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS AND TECHNOLOGIES (SECURWARE 2011), 2011, : 103 - 108
  • [22] A Protocol-based Intrusion Detection System using Dual Autoencoders
    Huang, Yu-Lun
    Hung, Ching-Yu
    Hu, Hsiao-Te
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 749 - 758
  • [23] A policy-based network management system for IPVPN
    Guo, X
    Yang, K
    Galis, A
    Cheng, XC
    Yang, B
    Liu, DY
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 1630 - 1633
  • [24] A policy-based security model for web system
    Xie, WX
    Ma, HD
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 187 - 191
  • [25] Policy-based distributed network management system
    Li, Li
    Ren, Xiu-Li
    Luan, Gui-Xing
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2002, 23 (06): : 515 - 518
  • [26] POSITIF: a policy-based security management system
    Basile, Cataldo
    Lioy, Antonio
    Perez, Gregorio Martinez
    Garcia Clemente, Felix J.
    Skarmeta, Antonio F. Gomez
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 280 - 280
  • [27] A policy-based hierarchical network management system
    Ping, W
    Hong, Z
    Li, L
    DCABES 2001 PROCEEDINGS, 2001, : 176 - 179
  • [28] A policy-based system for institutional web archiving
    Hiiragi, W
    Sakaguchi, T
    Sugimoto, S
    Tabata, K
    DIGITAL LIBRARIES: INTERNATIONAL COLLABORATION AND CROSS-FERTILIZATION, PROCEEDINGS, 2004, 3334 : 144 - 154
  • [29] An autonomous intrusion detection system for the RPL protocol
    Shirafkan, Mohammad
    Shahidienjad, Ali
    Ghobaei-Arani, Mostafa
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 484 - 502
  • [30] An autonomous intrusion detection system for the RPL protocol
    Mohammad Shirafkan
    Ali Shahidienjad
    Mostafa Ghobaei-Arani
    Peer-to-Peer Networking and Applications, 2022, 15 : 484 - 502