首页> 外文学位 >Intrusion detection and response for system and network attacks.
【24h】

Intrusion detection and response for system and network attacks.

机译:针对系统和网络攻击的入侵检测和响应。

获取原文
获取原文并翻译 | 示例

摘要

This work focuses on Intrusion Detection System (IDS) and Intrusion Response System (IRS) model for system and network attacks. For decades, IDS has evolved tremendously and has become highly sophisticated. However, the response to an attack is still manually triggered by an administrator who relies on static mapping to counteract the intrusion. The speed of attack-spread and its increased complexities in recent years have shown that it is highly critical to develop an automatic IRS. Moreover, manual responses are not flexible and effective in distributed environment without infrastructure.;This work presents a cost based response model that is tightly coupled with multi-source IDS. It is a known fact that any system can be broken down into smaller granules of services and resources. A dependency graph is employed to describe the relations between services and resources in a system. This dependency graph is also used to propagate the total value of the system down to the service and resource levels. The damage cost of the intrusion and the response cost of the responses are evaluated using the dependency graph. Using several performance metrics, a response which brings the most benefit to the system is deployed. We demonstrate the abilities of our model by using buffer overflow attack caused by a computer worm on Optimized Link State Routing (OLSR) protocol on a wireless ad-hoc network environment. Experimental results show that our model is effective and is highly practical.
机译:这项工作的重点是针对系统和网络攻击的入侵检测系统(IDS)和入侵响应系统(IRS)模型。几十年来,IDS发生了巨大的发展,并且变得非常复杂。但是,对攻击的响应仍然是由管理员手动触发的,该管理员依靠静态映射来抵消入侵。近年来,攻击扩散的速度及其日益增加的复杂性表明,开发自动IRS至关重要。此外,手动响应在没有基础结构的分布式环境中不灵活且无效。;该工作提出了一种基于成本的响应模型,该模型与多源IDS紧密结合。众所周知的事实是,任何系统都可以分解为较小的服务和资源颗粒。依赖图用于描述系统中服务和资源之间的关系。此依赖关系图还用于将系统的总价值向下传播到服务和资源级别。使用依赖图评估入侵的损失成本和响应的响应成本。使用多个性能指标,可以部署为系统带来最大收益的响应。我们通过使用计算机蠕虫在无线自组织网络环境中的优化链接状态路由(OLSR)协议上使用由计算机蠕虫引起的缓冲区溢出攻击来证明模型的功能。实验结果表明,该模型是有效的,具有很高的实用性。

著录项

  • 作者

    Stanley, Fred Philip.;

  • 作者单位

    Iowa State University.;

  • 授予单位 Iowa State University.;
  • 学科 Computer Science.
  • 学位 M.S.
  • 年度 2009
  • 页码 63 p.
  • 总页数 63
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号