Modeling requests among cooperating intrusion detection systems

被引:5
|
作者
Ning, P [1 ]
Wang, XS [1 ]
Jajodia, S [1 ]
机构
[1] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
intrusion detection; interoperation; common intrusion detection framework; misuse detection; coordinated attack;
D O I
10.1016/S0140-3664(00)00256-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is important for intrusion detection systems (IDSs) to share information in order to discover attacks involving multiple sites. However, no framework exists for an IDS to request from and send to another IDS data relevant to specific events. The lack of such a framework may result in a waste of processing time, storage capacity and network bandwidth. This paper proposes a formal framework modeling requests among the cooperating IDSs. To show wide applicability, the paper explores the use of the formal approach in the Common Intrusion Detection Framework (CIDF), extending CIDF components to include a query facility. (C) 2000 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:1702 / 1715
页数:14
相关论文
共 50 条
  • [31] Study of Intrusion Detection Systems
    Li-Chin Huang
    Min-Shiang Hwang
    [J]. Journal of Electronic Science and Technology, 2012, (03) : 269 - 275
  • [32] Intrusion detection systems as evidence
    Sommer, P
    [J]. COMPUTER NETWORKS, 1999, 31 (23-24) : 2477 - 2487
  • [33] Intrusion Detection in Database Systems
    Javidi, Mohammad M.
    Sohrabi, Mina
    Rafsanjani, Marjan Kuchaki
    [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 93 - 101
  • [34] A Review on Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT
    Prajapati, Priteshkumar
    Bhatt, Bhumika
    Zalavadiya, Gautam
    Ajwalia, Madhav
    Shah, Parth
    [J]. 2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021), 2021, : 588 - 593
  • [35] Study of Intrusion Detection Systems
    LiChin Huang
    MinShiang Hwang
    [J]. Journal of Electronic Science and Technology, 2012, 10 (03) : 269 - 275
  • [36] Insights into Anomaly-based Intrusion Detection Systems Usability. A Case Study using Real HTTP Requests
    Diaz-Verdejo, Jesus E.
    Alonso, Rafael Estepa
    Alonso, Antonio Estepa
    Munoz-Calle, Javier
    [J]. PROCEEDINGS OF THE 2024 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2024, 2024, : 82 - 89
  • [37] Traffic Modeling by Recurrent Neural Networks for Intrusion Detection in Industrial Control Systems
    Sokolov, Alexander N.
    Alabugin, Sergei K.
    Pyatnitsky, Ilya A.
    [J]. 2019 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2019,
  • [38] Packet-vs. session-based modeling for intrusion detection systems
    Caulkins, BD
    Lee, JH
    Wang, M
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 116 - 121
  • [39] Adaptation techniques for intrusion detection and intrusion response systems
    Ragsdale, DJ
    Carver, CA
    Humphries, JW
    Pooch, UW
    [J]. SMC 2000 CONFERENCE PROCEEDINGS: 2000 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOL 1-5, 2000, : 2344 - 2349
  • [40] Modeling and generation of detectors in artificial immune based network intrusion detection systems
    Shahein, HI
    Ibrahim, MO
    [J]. ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 238 - 244