首页> 外文OA文献 >A prototype for network intrusion detection system using danger theory
【2h】

A prototype for network intrusion detection system using danger theory

机译:基于危险理论的网络入侵检测系统原型

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Network Intrusion Detection System (NIDS) is considered as one of the last defense mechanisms for any organization. NIDS can be broadly classified into two approaches: misuse-based detection and anomaly-based detection. Misuse-based intrusion detection builds a database of the well-defined patterns of the attacks that exploit weaknesses in systems and network protocols, and uses that database to identify the intrusions. Although this approach can detect all the attacks included in the database, it leads to false negative errors where any new attack not included in that database can’t be detected. The other approach is the anomaly-based NIDS which is developed to emulate the Human Immune System (HIS) and overcome the limitation of the misuse-based approach. The anomaly-based detection approach is based on Negative Selection (NS) mechanism. NS is based on building a database of the normal self patterns, and identifying any pattern not included in that database as a non-self pattern and hence the intrusion is detected. Unfortunately, NS concept has also its drawbacks. Although any attack pattern can be detected as a non-self pattern and this leads to low false negative rate, non-self patterns would not necessarily indicate the existence of intrusions. So, NS has a high false positive error rate caused from that assumption. Danger Theory (DT) is a new concept in HIS, which shows that the response mechanism in HIS is more complicated and beyond the simple NS concept. So, is it possible to utilize the DT to minimize the high false positive detection rate of NIDS? This paper answers this question by developing a prototype for NIDS based on DT and evaluating that prototype using DARPA99 Intrusion Detection dataset.
机译:网络入侵检测系统(NIDS)被认为是任何组织的最后防御机制之一。 NIDS大致可分为两种方法:基于滥用的检测和基于异常的检测。基于滥用的入侵检测将建立利用系统和网络协议中的弱点的明确定义的攻击模式数据库,并使用该数据库来识别入侵。尽管这种方法可以检测数据库中包含的所有攻击,但会导致错误的误报错误,导致无法检测到该数据库中未包含的任何新攻击。另一种方法是基于异常的NIDS,该NIDS可以模拟人类免疫系统(HIS)并克服基于滥用的方法的局限性。基于异常的检测方法基于负选择(NS)机制。 NS基于建立正常自我模式的数据库,并将该数据库中未包含的任何模式识别为非自我模式,因此可以检测到入侵。不幸的是,NS概念也有其缺点。尽管可以将任何攻击模式检测为非自我模式,并且这会导致较低的误报率,但非自我模式不一定表示存在入侵。因此,NS会由于该假设而导致较高的误报率。危险理论(DT)是HIS中的一个新概念,它表明HIS中的响应机制更加复杂,并且超越了简单的NS概念。那么,是否有可能利用DT来降低NIDS的高假阳性检测率?本文通过开发基于DT的NIDS原型并使用DARPA99入侵检测数据集评估该原型来回答此问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号