Metadata for anomaly-based security protocol attack deduction

被引:10
|
作者
Leckie, T
Yasinsac, A
机构
[1] Northrop Grumman, Natl Secur Operat, Columbia, MD 21046 USA
[2] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
关键词
anomaly detection; security protocols; user profile; behavioral analysis;
D O I
10.1109/TKDE.2004.43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly-based Intrusion Detection Systems (IDS) have been widely recognized for their potential to prevent and reduce damage to information systems. In order to build their profiles and to generate their requisite behavior observations, these systems rely on access to payload data, either in the network or on the host system. With the growing reliance on encryption technology, less and less payload data is available for analysis. In order to accomplish intrusion detection in an encrypted environment, a new data representation must emerge. In this paper, we present a knowledge engineering approach to allow intrusion detection in an encrypted environment. Our approach relies on gathering and analyzing several forms of metadata relating to session activity of the principals involved and the protocols that they employ. We then apply statistical and pattern recognition methods to the metadata to distinguish between normal and abnormal activity and then to distinguish between legitimate and malicious behavior.
引用
收藏
页码:1157 / 1168
页数:12
相关论文
共 50 条
  • [41] Design of an Anomaly-based Threat Detection & Explication System
    Luh, Robert
    Schrittwieser, Sebastian
    Marschalek, Stefan
    Janicke, Helge
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 397 - 402
  • [42] Anomaly-based fault detection system in distributed system
    Kim, Byoung uk
    Hariri, Salim
    [J]. SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 782 - +
  • [43] Anomaly-based Identification of Large-Scale Attacks
    Gamer, Thomas
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 6638 - 6643
  • [44] A transparent and scalable anomaly-based DoS detection method
    Joldzic, Ognjen
    Djuric, Zoran
    Vuletic, Pavle
    [J]. COMPUTER NETWORKS, 2016, 104 : 27 - 42
  • [45] Anomaly-based intrusion monitoring using a dynamic honeypot
    Hieb, J
    Graham, JH
    [J]. PROCEEDINGS OF THE ISCA 20TH INTERNATIONAL CONFERENCE ON COMPUTERS AND THEIR APPLICATIONS, 2005, : 184 - 189
  • [46] Virtual Machine Introspection for Anomaly-Based Keylogger Detection
    Huseynov, Huseyn
    Kourai, Kenichi
    Saadawi, Tarek
    Igbe, Obinna
    [J]. 2020 IEEE 21ST INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2020,
  • [47] An Adaptive Anomaly-based Intrusion Prevention System for Databases
    Emrick, Eric S.
    Hu, Yi
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 3382 - 3389
  • [48] Anomaly-based intrusion detection using Bayesian networks
    Tylman, Wojciech
    [J]. DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 211 - +
  • [49] Integrating Anomaly-Based Approach into Bayesian Network Classifiers
    Benferhat, Salem
    Tabia, Karim
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 127 - 139
  • [50] SCADA Networks Anomaly-based Intrusion Detection System
    Almehmadi, Abdulaziz
    [J]. 11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,