【24h】

Towards data mining temporal patterns for anomaly intrusion detection systems

机译:面向异常入侵检测系统的数据挖掘时间模式

获取原文

摘要

A reasonably light-weight host and net-centric network IDS architecture model is indicated. The model is anomaly based on a state-driven notion of "anomaly". Therefore, the relevant distribution function need not remain constant; it could migrate from states to states without any a priori warning so long as its residency time at a next steady state is sufficiently long to make valid observations there. Only those intrusion events (basically DOS and DDOS variety) capable of triggering anomalous streams of attacks/response both near and/or far of target monitoring point(s) are considered at the first level of detection. At the next level of detection, the filtered states could be fine-combed in a batch mode to mine unacceptable strings of commands or known attack signatures.
机译:指出了一个轻量级的主机和以网络为中心的网络IDS体系结构模型。该模型是基于状态驱动的“异常”概念的异常。因此,相关的分布函数不必保持恒定。只要它在下一个稳定状态的驻留时间足够长以便在那里进行有效观察,它就可以在没有任何先验警告的情况下从一个州迁移到另一个州。在检测的第一级,仅考虑能够触发目标监视点附近和/或远处的攻击/响应异常流的那些入侵事件(基本上是DOS和DDOS变种)。在下一个检测级别,可以以批处理方式对筛选后的状态进行精细组合,以挖掘不可接受的命令字符串或已知的攻击特征。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号