Building agents for rule-based intrusion detection system

被引:15
作者
Jha, S [1 ]
Hassan, M [1 ]
机构
[1] Univ New S Wales, Sch Comp Sci & Engn, Sydney, NSW 2052, Australia
关键词
intrusion detection system; Linux platform; graphical beaming interface;
D O I
10.1016/S0140-3664(02)00038-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we describe the development and testing of an agent-based intrusion detection system for Linux platform. We take a dual-approach to intrusion detection: pre-emptory and reactionary. With the pre-emptory approach, a network-based agent is implemented to monitor all packets entering the network and detect a known attack-based on a pre-defined rule. The reactionary approach is realized through a separate host-based agent to routinely check specific log files in order to detect system anomalies caused by successful attacks, Once a possible intrusion attempt has been detected by either one of the agents, it attempt to block the attack, records the attack details in a system log file. E-mails the system administrator, displays a warning through a gaphical learning window. The agents operate in the background of user applications and system software without any noticeable performance effect on them. (C) 2002 Published by Elsevier Science B.V.
引用
收藏
页码:1366 / 1373
页数:8
相关论文
共 13 条
[1]  
[Anonymous], 1981, STD
[2]  
[Anonymous], ACM Trans. Inf. Syst. Secur, DOI DOI 10.1145/322510.322526
[3]  
BALASUBRAMANIYA.JS, 1998, ARCHITECTURE INTRUSI
[4]   Towards a taxonomy of intrusion-detection systems [J].
Debar, H ;
Dacier, M ;
Wespi, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :805-822
[5]  
HWANG T, 1999, P AS PAC NETW OP MAN
[6]  
LANE T, 1997, 20 NAT INF SYST SEC, P366
[7]  
LINDQVIST U, 1997, IEEE S SEC PRIV OAKL
[8]   NETWORK INTRUSION DETECTION [J].
MUKHERJEE, B ;
HEBERLEIN, LT ;
LEVITT, KN .
IEEE NETWORK, 1994, 8 (03) :26-41
[9]  
Paxson V., 1998, BRO SYSTEM DETECTING
[10]  
Porras P.A, 1997, P 20 NAT INF SYST SE, V3, P353