A proposal of protocol and policy-based intrusion detection system

被引:0
|
作者
Baba, T [1 ]
Matsuda, S [1 ]
机构
[1] NTT Data Corp, Res & Dev Headquarters, Chuo Ku, Tokyo 1040033, Japan
关键词
intrusion detection; IDS; network security; neural network; damage prediction;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, intrusion detection systems (IDSs) are widely deployed in enterprise networks for detecting network attacks. Most existing commercial IDSs are based on misuse detection model. In misuse detection, although known attacks can be detected, unknown attacks cannot be detected because attack signatures for unknown attacks cannot be generated. In this paper, we propose a method for detecting network attacks including unknown ones against servers such as web servers, mail servers, FTP servers, and DNS servers, using protocol specifications and site access policy. Furthermore, we propose a method to predict damage from detected attacks using neural networks.
引用
收藏
页码:365 / 370
页数:6
相关论文
共 50 条
  • [31] Dynamic conflict detection in policy-based management systems
    Dunlop, N
    Indulska, J
    Raymond, K
    SIXTH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2002, : 15 - 26
  • [32] An Expectation-Based Approach to Policy-Based Security of the Border Gateway Protocol
    Li, Jun
    Stein, Josh
    Zhang, Mingwei
    Maennel, Olaf
    2016 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2016,
  • [33] Protocol-based classification for intrusion detection
    Yu, Kun-Ming
    Wu, Ming-Feng
    Wong, Wai-Tak
    RECENT ADVANCES IN SYSTEMS, COMMUNICATIONS AND COMPUTERS, 2008, : 29 - +
  • [34] Protocol-based classification for intrusion detection
    Yu, Kun-Ming
    Wu, Ming-Feng
    Wong, Wai-Tak
    WSEAS: ADVANCES ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE, 2008, : 749 - +
  • [35] Protocol-based classification for intrusion detection
    Yu, Kun-Ming
    Wu, Ming-Feng
    Wong, W.-T.
    WSEAS Transactions on Computer Research, 2008, 3 (03): : 135 - 141
  • [36] A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol
    Liu, Qi
    Keller, Hubert B.
    Hagenmeyer, Veit
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [37] A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation
    Phit, Thyda
    Abe, Koki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (12) : 3956 - 3965
  • [38] Design and Implement of Linux Intrusion Detection System Based on Network Protocol Analysis
    Liu, WenTao
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 577 - 579
  • [39] A protocol for policy-based session control in disruption tolerant sensor networks
    Suzuki, Ryohei
    Sezaki, Kaoru
    Tobe, Yoshito
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (12) : 3426 - 3433
  • [40] Protocol support for policy-based management of mobile ad hoc networks
    Phanse, KS
    DaSilva, LA
    NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 3 - 16