首页> 外文期刊>Journal of computer sciences >Evaluating the Strengths and Weaknesses of Mining Audit Data for Automated Models for Intrusion Detection in Tcpdump and Basic Security Module Data | Science Publications
【24h】

Evaluating the Strengths and Weaknesses of Mining Audit Data for Automated Models for Intrusion Detection in Tcpdump and Basic Security Module Data | Science Publications

机译:在TCPDUMP和基本安全模块数据中评估用于自动化模型的挖掘模型的挖掘审计数据的优势和缺点科学出版物

获取原文
       

摘要

> Problem statement: Intrusion Detection System (IDS) have become an important component of infrastructure protection mechanism to secure the current and emerging networks, its services and applications by detecting, alerting and taking necessary actions against the malicious activities. The network size, technology diversities and security policies make networks more challenging and hence there is a requirement for IDS which should be very accurate, adaptive, extensible and more reliable. Although there exists the novel framework for this requirement namely Mining Audit Data for Automated Models for Intrusion Detection (MADAM ID), it is having some performance shortfalls in processing the audit data. Approach: Few experiments were conducted on tcpdump data of DARPA and BCM audit files by applying the algorithms and tools of MADAM ID in the processing of audit data, mine patterns, construct features and build RIPPER classifiers. By putting it all together, four main categories of attacks namely DOS, R2L, U2R and PROBING attacks were simulated. Results: This study outlines the experimentation results of MADAM ID in testing the DARPA and BSM data on a simulated network environment. Conclusion: The strengths and weakness of MADAM ID has been identified thru the experiments conducted on tcpdump data and also on Pascal based audit files of Basic Security Module (BSM). This study also gives some additional directions about the future applications of MADAM ID.
机译: > 问题声明:入侵检测系统(IDS)已成为基础设施保护机制的重要组成部分,以通过检测,警告和拍摄来保护当前和新兴网络,其服务和应用反对恶意活动的必要行动。网络规模,技术多样性和安全策略使网络更具挑战性,因此需要IDS的要求,这应该非常准确,自适应,可扩展且更可靠。尽管存在这项要求的新颖框架,即用于入侵检测的自动模型(MADAM ID)的挖掘审计数据,但它在处理审计数据时具有一些性能缺陷。 方法:通过在处理审核数据,矿山模式,构造特征的处理中,在DALPA和BCM审计文件的 TCPDUMP 数据上进行了少数实验并建立开膛手分类器。通过将其整合在一起,模拟了四种主要的攻击类别,即DOS,R2L,U2R和探测攻击。 结果:本研究概述了MADAM ID在模拟网络环境下测试了DARPA和BSM数据的实验结果。 结论:在 tcpdump 数据上进行的实验和基于基于基本安全的审计文件进行的实验,鉴定了MADAM ID的优点和弱点模块(BSM)。本研究还提供了关于MADAM ID的未来应用的额外方向。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号