首页> 外文期刊>IEEE Journal on Selected Areas in Communications >Determining the operational limits of an anomaly-based intrusion detector
【24h】

Determining the operational limits of an anomaly-based intrusion detector

机译:确定基于异常的入侵检测器的操作限制

获取原文
获取原文并翻译 | 示例
           

摘要

Anomaly-detection techniques have considerable promise for two difficult and critical problems in information security and intrusion detection: detecting novel attacks, and detecting masqueraders. One of the best-known anomaly detectors used in intrusion detection is stide. (Rather than STIDE or Stide or s-tide, we have chosen "stide" in keeping with the way the detector was referred to in the paper by Warrender et al., 1999.) Developed at the University of New Mexico, stide aims to detect attacks that exploit processes that run with root privileges. The original work on stide presented empirical results indicating that data sequences of length six and above were required for effective intrusion detection. This observation has given rise to the long-standing question, "why six?" accompanied by related questions regarding the conditions under which six may (not) be appropriate. This paper addresses the "why six" issue by presenting an evaluation framework for mapping out stide's effective operating space and by identifying conditions that contribute to detection capability, particularly detection blindness. A theoretical justification explains the effectiveness of sequence lengths of six and above, as well as the consequences of using other values. In addition, results of an investigation are presented, comparing stide's anomaly-detection capabilities with those of a competing detector.
机译:异常检测技术在解决信息安全和入侵检测中的两个困难和关键问题方面具有可观的前景:检测新型攻击和检测伪装。入侵检测中使用的最著名的异常检测器之一是stide。 (我们不是选择STIDE还是Stide或s-tide,而是根据Warrender等人(1999年)在论文中提到检测器的方式来选择“ stide”。)stide的目标是在新墨西哥大学开发检测利用root特权运行的进程的攻击。初步研究表明,经验结果表明有效入侵检测需要长度为6以上的数据序列。这种观察引起了一个长期存在的问题,“为什么要六个?”伴随有关条件的相关问题,其中六个条件可能不适用。本文通过提出一个评估框架来勾画出步态的有效操作空间,并确定有助于探测能力的条件,尤其是探测盲性,从而解决了“为什么要六个”的问题。理论上的解释说明了长度为6以上的序列的有效性,以及使用其他值的后果。此外,还提供了调查结果,将步态的异常检测能力与竞争检测器的异常检测能力进行了比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号