首页> 外文期刊>ACM Computing Surveys >Taxonomy and Survey of Collaborative Intrusion Detection
【24h】

Taxonomy and Survey of Collaborative Intrusion Detection

机译:分类和协作入侵检测调查

获取原文
获取原文并翻译 | 示例
       

摘要

The dependency of our society on networked computers has become frightening: In the economy, all-digital networks have turned from facilitators to drivers; as cyber-physical systems are coming of age, computer networks are now becoming the central nervous systems of our physical world-even of highly critical infrastructures such as the power grid. At the same time, the 24/7 availability and correct functioning of networked computers has become much more threatened: The number of sophisticated and highly tailored attacks on IT systems has significantly increased. Intrusion Detection Systems (IDSs) are a key component of the corresponding defense measures; they have been extensively studied and utilized in the past. Since conventional IDSs are not scalable to big company networks and beyond, nor to massively parallel attacks, Collaborative IDSs (CIDSs) have emerged. They consist of several monitoring components that collect and exchange data. Depending on the specific CIDS architecture, central or distributed analysis components mine the gathered data to identify attacks. Resulting alerts are correlated among multiple monitors in order to create a holistic view of the network monitored. This article first determines relevant requirements for CIDSs; it then differentiates distinct building blocks as a basis for introducing a CIDS design space and for discussing it with respect to requirements. Based on this design space, attacks that evade CIDSs and attacks on the availability of the CIDSs themselves are discussed. The entire framework of requirements, building blocks, and attacks as introduced is then used for a comprehensive analysis of the state of the art in collaborative intrusion detection, including a detailed survey and comparison of specific CIDS approaches.
机译:我们社会对联网计算机的依赖变得越来越可怕:在经济中,全数字网络已经从促进者转变为驱动者;随着网络物理系统的日趋成熟,计算机网络现在已成为我们物理世界的中枢神经系统,甚至是诸如电网等高度关键的基础设施。同时,网络计算机的24/7可用性和正确运行受到的威胁越来越大:对IT系统进行复杂且高度定制的攻击的数量已大大增加。入侵检测系统(IDS)是相应防御措施的关键组成部分。过去已经对其进行了广泛的研究和利用。由于常规的IDS不能扩展到大公司网络及其外部,也不能扩展到大规模并行攻击,因此出现了协作IDS(CIDS)。它们由几个收集和交换数据的监视组件组成。根据特定的CIDS体系结构,中央或分布式分析组件会挖掘收集的数据以识别攻击。生成的警报在多个监视器之间相关联,以便创建所监视网络的整体视图。本文首先确定了CIDS的相关要求;然后,它区分不同的构建基块,作为引入CIDS设计空间并就需求进行讨论的基础。基于此设计空间,讨论了规避CIDS的攻击和对CIDS自身可用性的攻击。然后,将所介绍的需求,构建块和攻击的整个框架用于协作入侵检测的最新技术的全面分析,包括详细的调查和特定CIDS方法的比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号