【24h】

Intrusion Detection System with packet filtering for IP Spoofing

机译:具有数据包过滤功能的IP欺骗入侵检测系统

获取原文

摘要

IP Spoofing is a problem without an easy solution, since it's inherent to the design of the TCP/IP suite. Understanding how and why spoofing attacks are used, combined with a few simple prevention methods, can help protect your network from these malicious cloaking and cracking techniques.. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network and host based IDS approaches. The rapid improvements of intrusions in internet and other networks are the main factors responsible for the propagation of different threats and vulnerabilities in the computing environment. Now a days the Ids makes use of the signature based detection approach which detects the actions based on analyzing the patterns such as text, password, time etc. So this will create difficulties in updating information and detecting unknown attacks. In this paper we make use of an improved EADS (Exception Agent Detection System) for making the header information secure. Packet filtering is one defense against IP spoofing attacks. The gateway to a network usually performs ingress filtering, which is blocking of packets from outside the network with a source address inside the network. This prevents an outside attacker spoofing the address of an internal machine. Ideally the gateway would also perform egress filtering on outgoing packets, which is blocking of packets from inside the network with a source address that is not inside. This prevents an attacker within the network performing filtering from launching IP spoofing attacks against external machines. In this paper, we also propose an inter-domain packet_filter (IDPF) architecture that can mitigate the level of IP spoofing on the Interne together with the IDS. We establish the conditions under which the IDPF framework works correctly in that it does not discard packets with valid source addresses. In this paper we propose an improved behavioral method for combating the unknown threats other that-- the usual context and content scanning techniques.
机译:IP欺骗是没有简单解决方案的问题,因为它是TCP / IP套件设计所固有的。了解如何以及为何使用欺骗攻击,并结合一些简单的预防方法,可以帮助保护您的网络免受这些恶意的伪装和破解技术的侵害。入侵检测系统(IDS)已用于保护这些环境,以便通过网络共享其数据和基于主机的IDS方法。 Internet和其他网络中入侵的迅速改善是导致计算环境中各种威胁和漏洞传播的主要因素。现在,Ids使用基于签名的检测方法,该方法基于对文本,密码,时间等模式的分析来检测动作。因此,这将在更新信息和检测未知攻击方面造成困难。在本文中,我们使用改进的EADS(异常代理检测系统)来确保标头信息的安全。数据包过滤是防御IP欺骗攻击的一种方法。网络网关通常执行入口过滤,即过滤来自网络外部的数据包以及网络内部的源地址。这样可以防止外部攻击者欺骗内部计算机的地址。理想情况下,网关还将对传出数据包执行出口过滤,这将阻止来自网络内部且源地址不在内部的数据包。这样可以防止执行过滤的网络中的攻击者发起针对外部计算机的IP欺骗攻击。在本文中,我们还提出了一种域间packet_filter(IDPF)体系结构,该体系结构可以减轻与IDS一起在Interne上进行IP欺骗的水平。我们建立IDPF框架正常工作的条件是,它不会丢弃具有有效源地址的数据包。在本文中,我们提出了一种改进的行为方法来应对未知威胁,而这些其他威胁包括: -- 通常的上下文和内容扫描技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号