Metadata for anomaly-based security protocol attack deduction

被引:10
|
作者
Leckie, T
Yasinsac, A
机构
[1] Northrop Grumman, Natl Secur Operat, Columbia, MD 21046 USA
[2] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
关键词
anomaly detection; security protocols; user profile; behavioral analysis;
D O I
10.1109/TKDE.2004.43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly-based Intrusion Detection Systems (IDS) have been widely recognized for their potential to prevent and reduce damage to information systems. In order to build their profiles and to generate their requisite behavior observations, these systems rely on access to payload data, either in the network or on the host system. With the growing reliance on encryption technology, less and less payload data is available for analysis. In order to accomplish intrusion detection in an encrypted environment, a new data representation must emerge. In this paper, we present a knowledge engineering approach to allow intrusion detection in an encrypted environment. Our approach relies on gathering and analyzing several forms of metadata relating to session activity of the principals involved and the protocols that they employ. We then apply statistical and pattern recognition methods to the metadata to distinguish between normal and abnormal activity and then to distinguish between legitimate and malicious behavior.
引用
收藏
页码:1157 / 1168
页数:12
相关论文
共 50 条
  • [21] Benchmarking anomaly-based detection systems
    Maxion, RA
    Tan, KMC
    [J]. DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2000, : 623 - 630
  • [22] AN ANOMALY-BASED WEB APPLICATION FIREWALL
    Torrano-Gimenez, Carmen
    Perez-Villegas, Alejandro
    Alvarez, Gonzalo
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 23 - 28
  • [23] An Efficient Authentication and Access Control Protocol for Securing UAV Networks Against Anomaly-Based Intrusion
    Rahman, Khaista
    Khan, Muhammad Asghar
    Afghah, Fatemeh
    Barb, Gordana
    Innab, Nisreen
    Cheema, Tanveer Ahmed
    [J]. IEEE ACCESS, 2024, 12 : 62750 - 62764
  • [24] An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection
    Kannari, Phanindra Reddy
    Chowdary, Noorullah Shariff
    Biradar, Rajkumar Laxmikanth
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 931 : 56 - 64
  • [25] An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection
    Kannari, Phanindra Reddy
    Chowdary, Noorullah Shariff
    Laxmikanth Biradar, Rajkumar
    [J]. Theoretical Computer Science, 2022, 931 : 56 - 64
  • [26] On the symbiosis of specification-based and anomaly-based detection
    Stakhanova, Natalia
    Basu, Samik
    Wong, Johnny
    [J]. COMPUTERS & SECURITY, 2010, 29 (02) : 253 - 268
  • [27] IEEE 802.11 Anomaly-based Behavior Analysis
    Alipour, Hamid
    Al-Nashif, Youssif B.
    Hariri, Salim
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
  • [28] Deconstructing the Assessment of Anomaly-based Intrusion Detectors
    Viswanathan, Arun
    Tan, Kymie
    Neuman, Clifford
    [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 286 - 306
  • [29] Aggregation and Thresholding Schemes for Anomaly-Based Approaches
    Benferhat, Salem
    Tabia, Karim
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 140 - 152
  • [30] Detecting novel steganography with an anomaly-based strategy
    Jackson, JT
    Gunsch, GH
    Claypoole, RL
    Lamont, GB
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2004, 13 (04) : 860 - 870