Automatic backdoor analysis with a network intrusion detection system and an integrated service checker

被引:0
|
作者
Juslin, J [1 ]
Virtanen, T [1 ]
机构
[1] Helsinki Univ Technol, Helsinki, Finland
关键词
intrusion detection; automation; alarm filtering;
D O I
10.1109/SMCSIA.2003.1232410
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we examine how a network intrusion detection system can be used as a trigger for service checking and reporting. This approach reduces the amount of false alerts (false positives) and raises the quality of the alert report. A sample data over the Christmas period of year 2002 is analyzed as an example and detection of unauthorized SSH servers used as the main application. Unauthorized interactive backdoors to a network belong to the most dangerous class of intrusions [1]. These backdoors are usually installed by root-kits, to hide the system compromise activity. They are a gateway to launch exploits, gain super-user access to hosts in the internal network and use the attacked network as a stepping stone to attack other networks. In this research we have developed software and done statistical analysis to assess and prevent such situations.
引用
收藏
页码:122 / 126
页数:5
相关论文
共 50 条
  • [1] Automatic analysis of firewall and network intrusion detection system configurations
    Uribe, Tomas
    Cheung, Steven
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 691 - 715
  • [2] Network Intrusion Detection System as a Service on OpenStack Cloud
    Xu, Chen
    Zhang, Ruipeng
    Xie, Mengjun
    Yang, Li
    [J]. 2019 IEEE 27TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP), 2019,
  • [3] The network management design integrated with the intrusion detection system
    Zhang, XY
    Li, CZ
    Hu, QG
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 257 - 262
  • [4] An integrated visual intrusion detection and analysis system
    Rana, AZ
    Huang, ML
    [J]. IC'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2004, : 577 - 583
  • [5] An integrated model of intrusion detection based on neural network and expert system
    Pan, ZS
    Lian, H
    Hu, GY
    Ni, GQ
    [J]. ICTAI 2005: 17TH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2005, : 671 - 672
  • [6] Network and Information Security, and Intrusion Detection System Analysis
    Wu, Ying
    [J]. 2013 INTERNATIONAL CONFERENCE ON EDUCATION AND EDUCATIONAL RESEARCH (EER 2013), 2013, 1 : 130 - 134
  • [7] An Integrated Decision System for Intrusion Detection
    Wang Ling
    Xiao Haijun
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 417 - +
  • [8] An Integrated Approach to Network Intrusion Detection and Prevention
    Prakash, B. Bhanu
    Yeswanth, Kaki
    Srinivas, M. Sai
    Balaji, S.
    Sekhar, Y. Chandra
    Nair, Aswathy K.
    [J]. INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 43 - 51
  • [9] An integrated system of intrusion detection based on rough set and wavelet neural network
    Yu, Ling
    Chen, Bo
    Xiao, Jumno
    [J]. ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 194 - +
  • [10] Recurrent network in Network Intrusion Detection System
    Xue, JS
    Sun, JZ
    Zhang, X
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2676 - 2679