Detecting and displaying novel computer attacks with macroscope

被引:5
|
作者
Cunningham, RK [1 ]
Lippmann, RP [1 ]
Webster, SE [1 ]
机构
[1] MIT, Lincoln Lab, Informat Syst Technol Grp, Lexington, MA 02420 USA
关键词
bottleneck verification (BV); intrusion detection; security;
D O I
10.1109/3468.935044
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Macroscope is a network-based intrusion detection system that uses bottleneck verification (BV) to detect user-to-superuser attacks. BV detects novel computer attacks by looking for users performing high privilege operations without passing through legal "bottleneck" checkpoints that grant those privileges. Macroscope's BV implementation models many common Unix commands, and has extensions to detect intrusions that exploit trust relationships, as well as previously installed Trojan programs. BV performs at a false alarm rate more than two orders of magnitude lower than a reference signature verification system, while simultaneously increasing the detection rate from roughly 20% to 80% of user-to-superuser attacks.
引用
收藏
页码:275 / 281
页数:7
相关论文
共 50 条
  • [41] Detecting DNS Amplification Attacks
    Kambourakis, Georgios
    Moschos, Tassos
    Geneiatakis, Dimitris
    Gritzalis, Stefanos
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2008, 5141 : 185 - 196
  • [42] On Detecting Code Reuse Attacks
    Kosolapov, Y. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (07) : 573 - 583
  • [43] Detecting SYN flooding attacks
    Wang, HI
    Zhang, DL
    Shin, KG
    IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 1530 - 1539
  • [44] Detecting Sybil attacks in VANETs
    Yu, Bo
    Xu, Cheng-Zhong
    Xiao, Bin
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2013, 73 (06) : 746 - 756
  • [45] Computer intrusions and attacks
    不详
    ELECTRONIC LIBRARY, 1999, 17 (02): : 115 - 119
  • [46] A Novel Method for Detecting Disk Filtration Attacks via the Various Machine Learning Algorithms
    Zhu, Weijun
    Xu, Mingliang
    CHINA COMMUNICATIONS, 2020, 17 (04) : 99 - 108
  • [47] Finsformer: A Novel Approach to Detecting Financial Attacks Using Transformer and Cluster-Attention
    An, Hao
    Ma, Ruotong
    Yan, Yuhan
    Chen, Tailai
    Zhao, Yuchen
    Li, Pan
    Li, Jifeng
    Wang, Xinyue
    Fan, Dongchen
    Lv, Chunli
    Uddin, Shahadat
    Imam, Tasadduq
    Colombage, Sisira
    APPLIED SCIENCES-BASEL, 2024, 14 (01):
  • [49] A Novel Method for Detecting Disk Filtration Attacks via the Various Machine Learning Algorithms
    Weijun Zhu
    Mingliang Xu
    China Communications, 2020, 17 (04) : 99 - 108
  • [50] Detecting command injection attacks in web applications based on novel deep learning methods
    Xinyu Wang
    Jiqiang Zhai
    Hailu Yang
    Scientific Reports, 14 (1)