首页> 外文会议>Annual Institute of Electrical and Electronics Engineers SMC Information Assurance Workshop >Architecture of the reconnaissance intrusion detection system (RIDS)
【24h】

Architecture of the reconnaissance intrusion detection system (RIDS)

机译:侦察入侵检测系统的体系结构(RIDS)

获取原文

摘要

This paper describes the architecture and provides early test results of the reconnaissance intrusion detection system (RIDS) prototype. RIDS is a session oriented, statistical tool, that relies on training to mold the parameters of its algorithms, capable of detecting even distributed stealthy reconnaissance attacks. It consists of two main functional modules or stages: the reconnaissance activity profiler (RAP), followed by the reconnaissance alert correlation (RAC), along with a security console. RAP is a session-oriented module capable of detecting stealthy scanning and probing attacks, while RAC is an alert-correlation module that fuses the RAP alerts into attack scenarios and discovers the distributed stealthy attack scenarios, RIDS has been evaluated against two data sets: (a) the DARPA'98 data, and (b) 3 weeks of experimental data generated using the CONEX testbed, running at average Ethernet speeds. RIDS has demonstrably achieved remarkable success; the false positive, false negative and misclassification rates found are low, less than 0.1%, for most reconnaissance attacks; they rise to about 6% for distributed highly stealthy attacks; the latter is a most challenging type of attack, which has been difficult to detect effectively until now. Thus, the RIDS system promises to provide an early warning by detecting the reconnaissance first phase of an impending attack, even if it is very stealthy and distributed.
机译:本文介绍了架构,并提供了侦察入侵检测系统(RIDS)原型的早期测试结果。 RIDS是一个面向会议的统计工具,它依赖于培训来模塑其算法的参数,能够检测甚至分布式隐秘的侦察攻击。它由两个主要功能模块或阶段组成:侦察活动分析器(RAP),后跟侦察警报相关性(RAC)以及安全控制台。 RAP是一个面向会议的模块,能够检测隐身扫描和探测攻击,而RAC是一个警报相关模块,使RAP警报融入攻击方案并发现分布式隐秘的攻击场景,RIDS已经针对两个数据集进行了评估:( a)DARPA'98数据,(B)使用Conex测试的3周的实验数据,以平均以太网速度运行。 Rids已经证明了卓越的成功;发现的假阳性,假阴性和错误分类率低,小于0.1%,对于大多数侦察攻击;分布式高度隐身的攻击,他们升至6%的左右;后者是最具挑战性的攻击类型,直到现在,这一直难以有效地检测。因此,除了在即将攻击的侦察第一阶段,即使是非常秘密和分布,脱离系统的利用是通过检测到即将到来的攻击的第一阶段来提供预警。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号