A proposal of protocol and policy-based intrusion detection system

被引:0
|
作者
Baba, T [1 ]
Matsuda, S [1 ]
机构
[1] NTT Data Corp, Res & Dev Headquarters, Chuo Ku, Tokyo 1040033, Japan
关键词
intrusion detection; IDS; network security; neural network; damage prediction;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, intrusion detection systems (IDSs) are widely deployed in enterprise networks for detecting network attacks. Most existing commercial IDSs are based on misuse detection model. In misuse detection, although known attacks can be detected, unknown attacks cannot be detected because attack signatures for unknown attacks cannot be generated. In this paper, we propose a method for detecting network attacks including unknown ones against servers such as web servers, mail servers, FTP servers, and DNS servers, using protocol specifications and site access policy. Furthermore, we propose a method to predict damage from detected attacks using neural networks.
引用
收藏
页码:365 / 370
页数:6
相关论文
共 50 条
  • [41] Policy-Based Signatures
    Bellare, Mihir
    Fuchsbauer, Georg
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 520 - 537
  • [42] Design and implementation of a policy-based privacy authorization system
    Choi, HyangChang
    Lee, SeungYong
    Lee, HyungHyo
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 129 - 140
  • [43] Exploiting Machine Learning Technique for Attack Detection in Intrusion Detection System (IDS) Based on Protocol
    Aladesote, Olomi Isaiah
    Fakoya, Johnson Tunde
    Agbelusi, Olutola
    ADVANCES IN INFORMATION SYSTEMS, ARTIFICIAL INTELLIGENCE AND KNOWLEDGE MANAGEMENT, ICIKS 2023, 2024, 486 : 158 - 167
  • [44] Policy-based networking
    Chadha, R
    Lapiotis, G
    Wright, S
    IEEE NETWORK, 2002, 16 (02): : 8 - 9
  • [45] Engineering a policy-based system for federated healthcare databases
    Bhatti, Rafae
    Samuel, Arjmand
    Eltabakh, Mohamed Y.
    Amjad, Haseeb
    Ghafoor, Arif
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (09) : 1288 - 1304
  • [46] Policy-Based Access Control System for Delta Lake
    Chen, Zhe
    Shao, Hangyu
    Li, Yuping
    Lu, Hongru
    Jin, Jiahui
    2022 TENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA, CBD, 2022, : 60 - 65
  • [47] A Policy-based CAC Scheme for Fixed WiMAX System
    Luo, Sida
    Li, Zhishu
    Hu, Tan
    Liu, Tao
    Cai, Biao
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 376 - 379
  • [48] The design and implementation of policy-based bandwidth billing system
    Chou, CC
    Huang, NF
    Yu, CP
    Huang, LH
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, 2003, 107 : 253 - 264
  • [49] Policy-based reinforcement learning for time series anomaly detection
    Yu, Mengran
    Sun, Shiliang
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2020, 95
  • [50] Protocol Aware Unsupervised Network Intrusion Detection System
    Ratti, Ritesh
    Singh, Sanasam Ranbir
    Nandi, Sukumar
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1524 - 1531