首页> 外文期刊>Journal of computer sciences >Evaluating the Strengths and Weaknesses of Mining Audit Data for Automated Models for Intrusion Detection in Tcpdump and Basic Security Module Data
【24h】

Evaluating the Strengths and Weaknesses of Mining Audit Data for Automated Models for Intrusion Detection in Tcpdump and Basic Security Module Data

机译:评估自动模型中Tcpdump中入侵检测的审计模型的挖掘审计数据的优缺点和基本安全模块数据

获取原文
获取原文并翻译 | 示例
       

摘要

Problem statement: Intrusion Detection System (IDS) have become an important component of infrastructure protection mechanism to secure the current and emerging networks, its services and applications by detecting, alerting and taking necessary actions against the malicious activities. The network size, technology diversities and security policies make networks more challenging and hence there is a requirement for IDS which should be very accurate, adaptive, extensible and more reliable. Although there exists the novel framework for this requirement namely Mining Audit Data for Automated Models for Intrusion Detection (MADAM ID), it is having some performance shortfalls in processing the audit data. Approach: Few experiments were conducted on tcpdump data of DARPA and BCM audit files by applying the algorithms and tools of MADAM ID in the processing of audit data, mine patterns, construct features and build RIPPER classifiers. By putting it all together, four main categories of attacks namely DOS, R2L, U2R and PROBING attacks were simulated. Results: This study outlines the experimentation results of MADAM ID in testing the DARPA and BSM data on a simulated network environment. Conclusion: The strengths and weakness of MADAM ID has been identified thru the experiments conducted on tcpdump data and also on Pascal based audit files of Basic Security Module (BSM). This study also gives some additional directions about the future applications of MADAM ID.
机译:问题陈述:入侵检测系统(IDS)已成为基础结构保护机制的重要组成部分,该机制通过检测,警告和采取针对恶意活动的必要措施来保护当前和新兴网络,其服务和应用程序。网络规模,技术多样性和安全策略使网络更具挑战性,因此对IDS的要求应该非常准确,自适应,可扩展且更可靠。尽管存在针对此要求的新颖框架,即“针对入侵检测自动模型挖掘审核数据(MADAM ID)”,但在处理审核数据方面存在一些性能缺陷。方法:通过使用MADAM ID的算法和工具处理审计数据,挖掘模式,构造特征和构建RIPPER分类器,很少对DARPA和BCM审计文件的tcpdump数据进行实验。综合起来,模拟了四种主要的攻击类型,即DOS,R2L,U2R和PROBING攻击。结果:本研究概述了MADAM ID在模拟网络环境下测试DARPA和BSM数据的实验结果。结论:通过对tcpdump数据以及基于Pascal的基本安全模块(BSM)审计文件进行的实验,已经确定了MADAM ID的优缺点。这项研究还为MADAM ID的未来应用提供了其他指导。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号