Metadata for anomaly-based security protocol attack deduction

被引:10
|
作者
Leckie, T
Yasinsac, A
机构
[1] Northrop Grumman, Natl Secur Operat, Columbia, MD 21046 USA
[2] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
关键词
anomaly detection; security protocols; user profile; behavioral analysis;
D O I
10.1109/TKDE.2004.43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly-based Intrusion Detection Systems (IDS) have been widely recognized for their potential to prevent and reduce damage to information systems. In order to build their profiles and to generate their requisite behavior observations, these systems rely on access to payload data, either in the network or on the host system. With the growing reliance on encryption technology, less and less payload data is available for analysis. In order to accomplish intrusion detection in an encrypted environment, a new data representation must emerge. In this paper, we present a knowledge engineering approach to allow intrusion detection in an encrypted environment. Our approach relies on gathering and analyzing several forms of metadata relating to session activity of the principals involved and the protocols that they employ. We then apply statistical and pattern recognition methods to the metadata to distinguish between normal and abnormal activity and then to distinguish between legitimate and malicious behavior.
引用
收藏
页码:1157 / 1168
页数:12
相关论文
共 50 条
  • [1] Collaborative anomaly-based attack detection
    Gamer, Thomas
    Scharf, Michael
    Schoeller, Marcus
    [J]. SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2007, 4725 : 280 - +
  • [2] An anomaly-based approach for DDoS attack detection in cloud environment
    Rawashdeh, Adnan
    Alkasassbeh, Mouhammd
    Al-Hawawreh, Muna
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2018, 57 (04) : 312 - 324
  • [3] Anomaly-based behavior analysis of wireless network security
    Fayssal, Samer
    Hariri, Salim
    Al-Nashif, Youssif
    [J]. 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 444 - 451
  • [4] Anomaly-Based Web Attack Detection: A Deep Learning Approach
    Liang, Jingxi
    Zhao, Wen
    Ye, Wei
    [J]. PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 80 - 85
  • [5] Anomaly-Based Intrusion Detection of Protocol-Aware Jamming
    Lichtman, Marc
    Reed, Jeffrey H.
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 269 - 274
  • [6] Optimizing anomaly-based attack detection using classification machine learning
    Gouda, Hany Abdelghany
    Ahmed, Mohamed Abdelslam
    Roushdy, Mohamed Ismail
    [J]. NEURAL COMPUTING & APPLICATIONS, 2024, 36 (06): : 3239 - 3257
  • [7] Optimizing anomaly-based attack detection using classification machine learning
    Hany Abdelghany Gouda
    Mohamed Abdelslam Ahmed
    Mohamed Ismail Roushdy
    [J]. Neural Computing and Applications, 2024, 36 : 3239 - 3257
  • [8] An Intelligent Security System Using Enhanced Anomaly-Based Detection Scheme
    Louati, Faten
    Barika Ktata, Farah
    Amous, Ikram
    [J]. COMPUTER JOURNAL, 2024, 67 (06): : 2317 - 2330
  • [9] Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
    Bolzoni, Damiano
    Etalle, Sandro
    Hartel, Pieter H.
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 1 - 20
  • [10] Anomaly-Based DDoS Attack Detection by Using Sparse Coding and Frequency Domain
    Fouladi, Ramin Fadaei
    Ermis, Orhan
    Anarim, Emin
    [J]. 2019 IEEE 30TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2019, : 1108 - 1113