An integrated visual intrusion detection and analysis system

被引:0
|
作者
Rana, AZ [1 ]
Huang, ML [1 ]
机构
[1] Univ Technol Sydney, Fac Informat Technol, Sydney, NSW 2007, Australia
关键词
intrusion detection systems; host-based intrusion detection systems; network-based intrusion detection systems; distributed intrusion detection systems; simple network management protocol; information visualization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing Intrusion Detection Systems often convey intrusion detection by using either or combination of network intrusion detection sensors, and host intrusion detection sensors. They do not integrate other devices such as firewalls, routers, mail, web, and DNS servers to extend the data collection resources. As a result of limited data resources, the higher correlation among intrusion data cannot be achieved and higher accurate results cannot be produced. There is also an issue of security between IDS sensors and central console. The intrusion results are also often represented as textual log files and hence are more difficult to analyze by a human user. This paper discusses a need and proposes a framework for an Integrated Intrusion detection system with inbuilt visual an lysis tool. This system will provide various logs, audit trails, policy violations and alerts. All of this data could be collected and aggregated into a single database. The database could then be analyzed by using data mining and information visualization methods to determine and verify if an intrusion has occurred.
引用
收藏
页码:577 / 583
页数:7
相关论文
共 50 条
  • [31] An integrated visualisation framework for intrusion detection
    Read, Huw
    Blyth, Andrew
    [J]. 2006 IEEE Information Assurance Workshop, 2006, : 268 - 274
  • [32] Analysis of Data Dependency Based Intrusion Detection System
    Nugmanov, Yermek
    Panda, Brajendra
    Hu, Yi
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 111 - +
  • [33] Intrusion Detection System for IoT: Analysis of PSD Robustness
    Sanogo, Lamoussa
    Alata, Eric
    Takacs, Alexandru
    Dragomirescu, Daniela
    [J]. SENSORS, 2023, 23 (04)
  • [34] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177
  • [35] Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System
    School of Computing, Teesside University, Middlesbrough, United Kingdom
    [J]. Int. J. Comput. Intell. Syst, 5 (841-853):
  • [36] Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System
    Albayati, Mohanad
    Issac, Biju
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2015, 8 (05) : 841 - 853
  • [37] Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System
    Mohanad Albayati
    Biju Issac
    [J]. International Journal of Computational Intelligence Systems, 2015, 8 : 841 - 853
  • [38] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [39] An integrated system of intrusion detection based on rough set and wavelet neural network
    Yu, Ling
    Chen, Bo
    Xiao, Jumno
    [J]. ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 194 - +
  • [40] Reliability Integrated Intrusion Detection System for Isolating Black Hole Attack in MANET
    Gopinath, S.
    Natraj, N. A.
    Bhanu, D.
    Sureshkumar, N.
    [J]. JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2020, 79 (10): : 905 - 908