A SNMP-based platform for distributed stateful intrusion detection in enterprise networks

被引:8
|
作者
Gaspary, LP [1 ]
Sanchez, RN [1 ]
Antunes, DW [1 ]
Meneghetti, E [1 ]
机构
[1] Univ Vale Rio dos Sinos, UNISINOS, PIPCA, BR-93022000 Sao Leopoldo, Brazil
关键词
computer network management; computer network security; site security monitoring;
D O I
10.1109/JSAC.2005.854116
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, intrusion detection systems (IDSs) use has increased into detect security breaches in both systems and networks. However, widespread IDS usage has been hindered by several challenges, including: 1) time-consuming configuration and analysis; 2) integration difficulties with existing network management infrastructure; and 3) the inability to add new attack signatures in a well-understood, yet expressive high-level notation. This paper presents the ID-Trace Management Platform, an extension of the simple network management protocol infrastructure based on the Internet Engineering Task Force (IETF) script management information base (Script MIB) to support distributed stateful intrusion detection in enterprise networks. It provides mechanisms allowing a management station to delegate security-related tasks to mid-level managers (MLMs) that, in turn, interact with monitoring and action agents to execute these tasks. Protocol trace specification language specifications are used by the MLMs to program monitoring agents that sniff packets on the network comparing their signatures to those of known attack signatures. With the information gathered from the monitoring process, the MLMs may execute procedures via the action agents (Java, Tcl, or Perl scripts), enabling the automation of several security tasks (including reactive and proactive tasks). The platform also provides notification mechanisms (traps) so that MLMs can report the occurrence of major events to the management station.
引用
收藏
页码:1973 / 1982
页数:10
相关论文
共 50 条
  • [1] Proactive intrusion detection and SNMP-BASED security management:: New experiments and validation
    Cabrera, JBD
    Lewis, L
    Qin, X
    Gutiérrez, C
    Lee, W
    Mehra, RK
    INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 : 93 - 96
  • [2] SNMP-based enterprise IP network topology discovery
    Pandey, Suman
    Choi, Mi-Jung
    Won, Young J.
    Hong, James Won-Ki
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2011, 21 (03) : 169 - 184
  • [3] A dependable SNMP-based tool for distributed network management
    Duarte, EP
    De Bona, LCE
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 279 - 284
  • [4] Integrated platform for CMIP-based and SNMP-based management
    Motomura, K
    Nakamura, N
    Aibara, T
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1997, E80B (06) : 861 - 868
  • [5] SNMP-based approach to scalable smart transducer networks
    Scherer, B
    Tóth, C
    Kovácsházy, T
    Vargha, B
    IMTC/O3: PROCEEDINGS OF THE 20TH IEEE INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE, VOLS 1 AND 2, 2003, : 721 - 725
  • [6] SNMP-Based RMA Analysis of Wired and Wireless Networks
    Sheybani, E.
    Ralph, L.
    Javidi, G.
    Eslami, A.
    Luttamaguzi, J.
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2013, 5 (03) : 49 - 53
  • [7] A Distributed Network-Sensor Based Intrusion Detection Framework in Enterprise Networks
    Zhang, Difan
    Yu, Wei
    Hardy, Rommie
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1195 - 1200
  • [8] SNMP-Based Detection of VLAN Hopping Attack Risk
    Kim, Kwangjun
    Lee, Manhee
    INFORMATION SCIENCE AND APPLICATIONS 2018, ICISA 2018, 2019, 514 : 267 - 272
  • [9] SNMP-Based Approach to Load Distribution in IEEE 802.11 Networks
    Yen, Li-Hsing
    Yeh, Tse-Tsung
    2006 IEEE 63RD VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 1196 - 1200
  • [10] Stateful intrusion detection for high-speed networks
    Kruegel, C
    Valeur, F
    Vigna, G
    Kemmerer, R
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 285 - 293