首页> 外文学位 >A protocol-specific constraint-based intrusion detection system
【24h】

A protocol-specific constraint-based intrusion detection system

机译:基于协议的基于约束的入侵检测系统

获取原文
获取原文并翻译 | 示例

摘要

With the advancement of new technologies, the frequency of malicious attacks is also growing rapidly. Even networks without external connections cannot hide from these attacks. Constant monitoring of a network is vital for an organization's security system. Among numerous monitoring techniques, network behavior analysis has become popular. Normal traffic patterns of a network can be modeled as network constraints. The violation of these constraints indicates the possibility that an intrusion has occurred. Expressing network vulnerabilities is not an easy task. Sometimes, it is more complicated than recognizing an intruder's attack pattern. Currently, network administrators use Intrusion Detection System (IDS) rules to define security concerns regarding their networks. An IDS rule finds it difficult to detect sophisticated multi-packet intrusions. Constraints compared to IDS rules possess better expressiveness to describe a network behavior for defending the network against different attacks. Evaluating constraints in an efficient manner is a key to achieving a better IDS. Numerous constraint checking techniques provide good performance in solving constraints. However, they are not always effective in checking constraints with dynamic information. In this thesis, we propose a protocol specific constraint-based IDS to detect intrusions in a network. We investigate two protocols used in the Data Distribution Service (DDS) and identify their vulnerabilities. These two protocols are Internet Group Management Protocol (IGMP) and Real-Time Publisher Subscriber Protocol (RTPS). We develop constraints to protect a network against attacks that may exploit these vulnerabilities. For checking these constraints, a naive tree-based technique along with an optimized version is presented. Both techniques have the adaptability to cope with a continuous update of relevant network behavior information from a network traffic. The structure and life cycle of the constraint trees are explained in detail. A Domain Specific Language (DSL) is designed to express these constraints. An experimental private network is built which simulates network traffic similar to an Air Traffic Control System (ATC). Finally, we present how this IDS evaluates network constraints against the traffic generated from the experimental network and prevents attacks.
机译:随着新技术的进步,恶意攻击的频率也在迅速增长。即使没有外部连接的网络也无法躲避这些攻击。持续监视网络对于组织的安全系统至关重要。在众多监视技术中,网络行为分析已变得很流行。可以将网络的正常流量模式建模为网络约束。违反这些约束条件表明发生入侵的可能性。表达网络漏洞并非易事。有时,它比识别入侵者的攻击方式更为复杂。当前,网络管理员使用入侵检测系统(IDS)规则来定义有关其网络的安全问题。 IDS规则发现很难检测复杂的多数据包入侵。与IDS规则相比,约束具有更好的表达能力,可以描述网络行为以保护网络免受不同攻击。以有效的方式评估约束是获得更好的IDS的关键。多种约束检查技术在解决约束方面提供了良好的性能。但是,它们在检查动态信息约束时并不总是有效的。在本文中,我们提出了一种基于协议的基于约束的IDS来检测网络中的入侵。我们调查了数据分发服务(DDS)中使用的两种协议,并确定了它们的漏洞。这两个协议是Internet组管理协议(IGMP)和实时发布者订阅者协议(RTPS)。我们制定了约束条件,以保护网络免受可能利用这些漏洞的攻击。为了检查这些约束,提出了基于朴素树的技术以及优化版本。两种技术都具有适应能力,以应对来自网络流量的相关网络行为信息的连续更新。详细解释了约束树的结构和生命周期。域特定语言(DSL)旨在表达这些约束。建立了一个实验性的专用网络,该网络模拟了类似于空中交通管制系统(ATC)的网络流量。最后,我们介绍此IDS如何根据实验网络生成的流量评估网络约束并防止攻击。

著录项

  • 作者

    Hasan, Md Siam.;

  • 作者单位

    Queen's University (Canada).;

  • 授予单位 Queen's University (Canada).;
  • 学科 Computer science.
  • 学位 M.S.
  • 年度 2017
  • 页码 116 p.
  • 总页数 116
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号