A distributed intrusion detection model for the domain name system

被引:0
|
作者
Chen, CS [1 ]
Tseng, SS [1 ]
Liu, CL [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Sci, Hsinchu 300, Taiwan
关键词
DoS; DNS; distributed two-phase DNS anomaly detection; IDS; two-phase anomaly detection algorithms;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We have investigated the problem of detecting DoS-like DNS anomalies in DNS system. In this paper, we propose a distributed Two-phase DNS anomaly detection model for solving the problem. Three sets of algorithms corresponding to different configurations are proposed, including one sequential algorithm and two distributed algorithms, each with an increasing level of parallelism. The complexity of these algorithms have been found to be O (n l(og)n). The distributed algorithms show at least a constant (1-1/C-k), C-k > 1, improvement over the sequential one. To evaluate the performance, we have implemented the algorithms and applied them to a number of examples. The experimental result shows a speed up of about 1.68 on the test example for running on an enhanced distributed architecture with C-IDS over the sequential one. A higher speedup might be common because DNS anomalies will make the traffic distribution more concentrated on the outliers, and the computation will usually converge much more quickly.
引用
收藏
页码:999 / 1009
页数:11
相关论文
共 50 条
  • [1] A distributed intrusion detection model for the domain name system
    Chen, Chang-Sheng
    Tseng, Shian-Shyong
    Liu, Chien-Liang
    [J]. 2002, Institute of Information Science (18)
  • [2] MODEL OF DISTRIBUTED INTRUSION DETECTION SYSTEM
    Trifonov, Vencisalv
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2010, 2 (02): : 67 - 72
  • [3] A Distributed Intrusion Detection System Model
    Wu, Shaofei
    Xiao, Shuchao
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL PRE-OLYMPIC CONGRESS ON COMPUTER SCIENCE, VOL I: COMPUTER SCIENCE AND ENGINEERING, 2008, : 331 - 334
  • [4] An adaptive model of a distributed intrusion detection system
    Platonov V.V.
    Semenov P.O.
    [J]. Automatic Control and Computer Sciences, 2017, 51 (8) : 894 - 898
  • [5] Distributed model of intrusion detection system based on agent
    Ma, Heng-Tai
    Jiang, Jian-Chun
    Chen, Wei-Feng
    Qing, Si-Han
    [J]. Ruan Jian Xue Bao/Journal of Software, 2000, 11 (10): : 1312 - 1319
  • [6] A study on the distributed communication model of intrusion Detection System
    Park, SY
    Park, SG
    [J]. HCI '05: Proceedings of the 2005 International Conference on Human-Computer Interaction, 2005, : 24 - 29
  • [7] Distributed intrusion detection system based on grid security model
    Su, Jie
    Liu, Yahui
    [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973
  • [8] A model of intelligent agent based distributed intrusion detection system
    Fu, W
    Meng, B
    [J]. PROCEEDINGS OF 2003 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, VOLS I AND II, 2003, : 92 - 95
  • [9] A secure domain name system based on intrusion tolerance
    Zhou, Wei
    Chen, Liu
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3535 - +
  • [10] Research on distributed intrusion detection system
    Wang, Zeng-Quan
    Wang, Hui-Qiang
    Zhao, Qian
    Zhang, Rui-Jie
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 181 - +