Policy management for network-based intrusion detection and prevention

被引:5
|
作者
Chen, YM
Yang, YY
机构
关键词
D O I
10.1109/NOMS.2004.1317855
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection and prevention systems are becoming an essential part of network infrastructure. They provide the ability to detect intrusion signatures or discover abnormal behaviors, and thus trigger actions. The actions are performed to preempt ongoing attacks as well as to prevent future intrusions. In the past, intrusion detection technology is mainly deployed as sensors that passively monitor traffic to detect symptoms that indicate attacks or their prelude. However, recent Internet worms and distributed denial-of-service attacks have shown that such passive detection is not timely enough in coping with network-based attacks. Thus, the recent trend is to integrate detection and prevention technologies into security firewalls, and deploy the technologies as active components in the network infrastructure. This poses a new challenge for network operation and policy management. The objective of this paper is to provide a framework for managing related policies in an enterprise-networking environment. Specifically, we propose a framework called Attack-Response Matrix (ARM), to integrate intrusion analysis with traffic enforcement for security purposes. ARM describes the mapping from intrusion types to traffic enforcement actions. It allows policies to dictate what actions to take on what types or stages of attacks. It is intuitive, and introduces a paradigm shift from flat detection rules to a structural representation that better describes an intrusion prevention system (IPS). It can be integrated with the framework of policy-based management, using policy decision points (i.e. PDP) and policy enforcement points (i.e. PEP), to configure, enforce, update and monitor intrusion prevention devices in the network. In the paper, we also point out related research issues, such as the chaining of prevention actions and the self-correction of traffic enforcement policies.
引用
收藏
页码:219 / 232
页数:14
相关论文
共 50 条
  • [1] A Centralized Management Framework of Network-based Intrusion Detection and Prevention System
    Wonghirunsombat, Ekgapark
    Asawaniwed, Teewalee
    Hanchana, Vassapon
    Wattanapongsakorn, Naruemon
    Srakaew, Sanan
    Charnsripinyo, Chalermpol
    [J]. 2013 10TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2013, : 183 - 188
  • [2] A Network-based Internet Worm Intrusion Detection and Prevention System
    Wattanapongsakorn, N.
    Wonghirunsombat, E.
    Assawaniwed, T.
    Hanchana, V.
    Srakaew, S.
    Charnsripinyo, C.
    [J]. 2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [3] Web-based monitoring approach for network-based intrusion detection and prevention
    Naruemon Wattanapongsakorn
    Chalermpol Charnsripinyo
    [J]. Multimedia Tools and Applications, 2015, 74 : 6391 - 6411
  • [4] Web-based monitoring approach for network-based intrusion detection and prevention
    Wattanapongsakorn, Naruemon
    Charnsripinyo, Chalermpol
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (16) : 6391 - 6411
  • [5] Weaknesses and Strengths Analysis over Network-based Intrusion Detection and Prevention Systems
    Guillen, Edward
    Padilla, Daniel
    Colorado, Yudy
    [J]. 2009 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM 2009), 2009, : 181 - 185
  • [6] A Network-Based Intrusion Detection and Prevention System with Multi-Mode Counteractions
    Yousufi, Raz Mohammad
    Lalwani, Punit
    Potdar, M. B.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [7] A security policy and Network Cartography based Intrusion Detection and Prevention Systems
    Meharouech, Sourour
    Bouhoula, Adel
    Abbes, Tarek
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 279 - 291
  • [8] Neural network-based intrusion detection systems
    Hu, LX
    He, ZJ
    [J]. COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 296 - 298
  • [9] NetSTAT: A network-based intrusion detection approach
    Vigna, G
    Kemmerer, RA
    [J]. 14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 25 - 34
  • [10] Flexible Network-based Intrusion Detection and Prevention System on Software-defined Networks
    An Le
    Phuong Dinh
    Hoa Le
    Ngoc Cuong Tran
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2015, : 106 - 111