Network intrusion detection - Automated and manual methods prone to attack and evasion

被引:21
作者
Chaboya, David J. [1 ]
Raines, Richard A.
Baldwin, Rusty O.
Mullins, Barry E.
机构
[1] USAF, Inst Technol, Res Labs, Antitamper & Software Protect Initiat Off, Wright Patterson AFB, OH 45433 USA
[2] USAF, Inst Technol, Dept Elect & Comp Engn, Wright Patterson AFB, OH 45433 USA
关键词
(Edited Abstract);
D O I
10.1109/MSP.2006.159
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A network intrusion detection system (NIDS) monitors the traffic on an entire network to determine the occurrence of an attack or intrusion. NIDSs scan traffic going to and from the protected network for malicious activity, and when the system detects a security violation, it triggers an alert that contains information such as as type of attack, destination port, and IP address. The benefit of such real-time alerts is that the NIDS detects and responds to intruder actions immediately, potentially mitigating damages. Contextual signatures extend NIDSs alerting with techniques such as understanding the network and matching on server-response traffic. Many NIDSs, such as Snort and Bro, provide additional connection data that let analyst look for sighs of backdoor connections or reply traffic. Further research into such technologies can be proved to be very beneficial in reducing both the analyst workload and the risk from evasion attacks.
引用
收藏
页码:36 / 43
页数:8
相关论文
共 16 条
[1]  
ALLEN J, 2000, CMUSEI99TR028, P37
[2]  
CHONG SK, 2004, PHRACK, V11
[3]  
DETRISTAN T, 2003, PHRACK, V11
[4]  
Goodall J. R., 2004, P 10 AM C INF SYST N, P1421
[5]   Bayesian event classification for intrusion detection [J].
Kruegel, C ;
Mutz, D ;
Robertson, W ;
Valeur, F .
19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, :14-23
[6]  
KRUEGEL C, 2004, P 1 WORKSH DET INTR, P1
[7]  
KUSTER R, 2003, 3 WAYS INJECT YOUR C
[8]  
MILLER M, 2003, UNDERSTANDING WINDOW
[9]  
NING P, 2003, INTERNET ENCY, P2
[10]  
PAXSON V, 1998, P 7 ANN US SEC S SEC, P12