首页> 外文期刊>Computer networks >An overview of anomaly detection techniques: Existing solutions and latest technological trends
【24h】

An overview of anomaly detection techniques: Existing solutions and latest technological trends

机译:异常检测技术概述:现有解决方案和最新技术趋势

获取原文
获取原文并翻译 | 示例

摘要

As advances in networking technology help to connect the distant corners of the globe and as the Internet continues to expand its influence as a medium for communications and commerce, the threat from spammers, attackers and criminal enterprises has also grown accordingly. It is the prevalence of such threats that has made intrusion detection systems-the cyberspace's equivalent to the burglar alarm-join ranks with firewalls as one of the fundamental technologies for network security. However, today's commercially available intrusion detection systems are predominantly signature-based intrusion detection systems that are designed to detect known attacks by utilizing the signatures of those attacks. Such systems require frequent rule-base updates and signature updates, and are not capable of detecting unknown attacks. In contrast, anomaly detection systems, a subset of intrusion detection systems, model the normal systemetwork behavior which enables them to be extremely effective in finding and foiling both known as well as unknown or "zero day" attacks. While anomaly detection systems are attractive conceptually, a host of technological problems need to be overcome before they can be widely adopted. These problems include: high false alarm rate, failure to scale to gigabit speeds, etc. In this paper, we provide a comprehensive survey of anomaly detection systems and hybrid intrusion detection systems of the recent past and present. We also discuss recent technological trends in anomaly detection and identify open problems and challenges in this area.
机译:随着网络技术的进步帮助连接全球的各个角落,并且随着Internet继续扩大其作为通信和商务媒介的影响力,垃圾邮件发送者,攻击者和犯罪企业的威胁也相应增加。正是这种威胁的普遍存在使入侵检测系统成为可能-相当于防盗警报连接的网络空间已被防火墙作为网络安全的基本技术之一。但是,当今市售的入侵检测系统主要是基于签名的入侵检测系统,旨在通过利用那些攻击的签名来检测已知攻击。这样的系统需要频繁的规则库更新和签名更新,并且无法检测未知攻击。相反,作为入侵检测系统子集的异常检测系统则对正常的系统/网络行为建模,这使它们在发现和挫败已知和未知或“零时差”攻击方面极为有效。尽管异常检测系统在概念上很有吸引力,但是在广泛应用之前,需要克服许多技术问题。这些问题包括:虚假警报率高,无法扩展到千兆位速度等。在本文中,我们对异常检测系统和混合入侵检测系统进行了全面的概述。我们还将讨论异常检测方面的最新技术趋势,并确定该领域中的开放性问题和挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号