Modeling requests among cooperating intrusion detection systems

被引:5
|
作者
Ning, P [1 ]
Wang, XS [1 ]
Jajodia, S [1 ]
机构
[1] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
intrusion detection; interoperation; common intrusion detection framework; misuse detection; coordinated attack;
D O I
10.1016/S0140-3664(00)00256-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is important for intrusion detection systems (IDSs) to share information in order to discover attacks involving multiple sites. However, no framework exists for an IDS to request from and send to another IDS data relevant to specific events. The lack of such a framework may result in a waste of processing time, storage capacity and network bandwidth. This paper proposes a formal framework modeling requests among the cooperating IDSs. To show wide applicability, the paper explores the use of the formal approach in the Common Intrusion Detection Framework (CIDF), extending CIDF components to include a query facility. (C) 2000 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:1702 / 1715
页数:14
相关论文
共 50 条
  • [1] Cooperating systems for global intrusion detection and tolerance
    Meddeb-Makhlouf, Amel
    Djemaiel, Yacine
    Boudriga, Noureddine
    [J]. 41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 235 - 242
  • [2] Cooperating security managers: Distributed intrusion detection systems
    White, Gregory
    Pooch, Vdo
    [J]. Computers and Security, 15 (05): : 441 - 450
  • [3] Cooperating security managers: Distributed intrusion detection systems
    White, G
    Pooch, V
    [J]. COMPUTERS & SECURITY, 1996, 15 (05) : 441 - 450
  • [4] Research on communication mechanism among cooperating multi-intrusion detection agents
    Zhang, Wei
    Teng, Shaohua
    Fu, Yiufen
    Wang, Lin
    [J]. PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, VOLS 1 AND 2, 2006, : 743 - 748
  • [5] A mechanism of intrusion detection system cooperating with firewall
    Cao, Zijian
    Rong, Xiaofeng
    [J]. Cao, Z., 2013, Asian Network for Scientific Information (12) : 6449 - 6454
  • [6] PAYLOAD MODELING FOR NETWORK INTRUSION DETECTION SYSTEMS
    Nwanze, Nnamdi
    Kim, Sun-il
    Summerville, Douglas H.
    [J]. MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 1357 - +
  • [7] Requirements of information reductions for cooperating intrusion detection agents
    Flegel, Ulrich
    Biskup, Joachim
    [J]. EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 466 - 480
  • [8] Modeling networking protocols to test intrusion detection systems
    Luo, S
    Marin, GA
    [J]. LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 774 - 775
  • [9] Hybrid feature selection for modeling intrusion detection systems
    Chebrolu, S
    Abraham, A
    Thomas, JP
    [J]. NEURAL INFORMATION PROCESSING, 2004, 3316 : 1020 - 1025
  • [10] An Architecture of a Distributed Intrusion Detection System Using Cooperating Agents
    Sen, Jaydip
    Sengupta, Indranil
    Chowdhury, Piyali Roy
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS (ICOCI 2006), 2006, : 17 - +