Locality-based profile analysis for secondary intrusion detection

被引:0
|
作者
Zhou, M [1 ]
Lee, R [1 ]
Lang, SD [1 ]
机构
[1] Univ Cent Florida, Sch Elect Engn & Comp Sci, Orlando, FL 32816 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While a firewall at the perimeter of a local network provides the first line of defense against attackers, many intrusion incidents result from successftd penetration of the firewall. The compromise of one computer puts the entire network at risk. We propose a distributed personal Intrusion Detection System (IDS) that provides local anomaly detection as well as centralized traffic analysis. The system first builds profiles for normal network activity and then labels as suspicious any events that deviate from the normal profiles. The normal profiles are based on variations in connection-based behavior at each individual host. Deviations at each host are recorded using a local weight assignment scheme and then further processed by the central analyzer to build a weighted link graph representing the overall network abnormality. As local networks become more vulnerable to inside attack, our system reinforces security to prevent corruption from the inside.
引用
收藏
页码:166 / 171
页数:6
相关论文
共 50 条
  • [1] Locality-based server profiling for intrusion detection
    Lee, Robert
    Lang, Sheau-Dong
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 205 - 216
  • [2] Locality-based Partitioning for Spark
    Xia Yuchong
    Yang Fangfang
    [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 1188 - 1192
  • [3] Locality-based abstractions
    Esparza, J
    Ganty, P
    Schwoon, S
    [J]. STATIC ANALYSIS, PROCEEDINGS, 2005, 3672 : 118 - 134
  • [4] Feature Extraction by Locality-based Linear Discriminant Analysis
    Huang, Pu
    Chen, Caikou
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL IV, 2010, : 434 - 438
  • [5] Locality-Based Visual Outlier Detection Algorithm for Time Series
    Li, Zhihua
    Li, Ziyuan
    Yu, Ning
    Wen, Steven
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [6] Locality-based security policies
    Tolstrup, Terkel K.
    Nielson, Flemming
    Hansen, Rene Rydhof
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2007, 4691 : 185 - +
  • [7] A locality-based lens for coded computation
    Rudow, Michael
    Rashmi, K., V
    Guruswami, Venkatesan
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 1070 - 1075
  • [8] Locality-based Linear Discriminant Projection
    Ding Xinlong
    Huang Pu
    Chen Caikou
    [J]. PROCEEDINGS OF THE 31ST CHINESE CONTROL CONFERENCE, 2012, : 3942 - 3946
  • [9] Locality-based network creation games
    Bilò, Davide
    Gualà, Luciano
    Leucci, Stefano
    Proietti, Guido
    [J]. ACM Transactions on Parallel Computing, 2016, 3 (01)
  • [10] A locality-based replication manager for data cloud
    Sookhtsaraei, Reza
    Artin, Javad
    Ghorbani, Ali
    Faraahi, Ahmad
    Adineh, Hadi
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2016, 17 (12) : 1275 - 1286