4.2.3 Resolver Component 4.3 Nides Security Oocer User Interface 4.4 Nides Infrastructural Components 4.2.1 Statistical Analysis Component 4.2.2 Rulebased Analysis Component

نویسندگان

  • T. F. Lunt
  • A. Tamaru
  • F. Gilham
  • R. Jagannathan
  • P. G. Neumann
  • Ann Tamaru
  • Fred Gilham
  • Caveh Jalali
  • H. S. Javitz
  • A. Valdes
  • James P. Anderson
  • P. T. Cummings
  • D. A. Fullam
  • M. J. Goldstein
  • M. J. Gosselin
  • J. Picciotto
  • D. E. Denning
چکیده

16 violations, whether they are initiated by outsiders who attempt to break into a system or by insiders who attempt to misuse their privileges. NIDES is designed to be independent of any particular target system, application environment, level of audit data (e.g., user level or network level), system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection system using real-time analysis of audit data. Each target system must install an agen facility (see section 4.1) to collect audit data and put them into NIDES's generic audit record format. We have developed a exible audit record format and a protocol for the transmission of audit records from the target system. The NIDES protocol and its audit record format are system-independent; our intent is that NIDES can be used to monitor diierent systems (even simultaneously) without fundamental alteration. 5 Conclusions Intrusions can be detected by detecting departures from users' normal behavior patterns. In addition, a rule-based approach in which rules characterizing intrusive behavior are constructed for evaluation against observed user behavior can be used. The strength of the rst approach is that intrusive behavior that shows up in unforeseen ways can potentially be detected; the weakness is that certain behaviors generally agreed to be abusive or suspicious are not easily monitored for. The strength of the second approach is the ease of stating exactly that behavior that is considered intrusive or undesirable; conversely, its weakness is that only behavior that has been foreseen to be intrusive will be caught: novel or highly sophisticated attacks may go undetected. In addition, the use of other approaches, such as model-based reasoning and neural networks, appears to be promising. In order to eeectively address the various intrusion threats, a system should combine several intrusion-detection approaches. We should begin to see intrusion-detection systems that can intelligently make use of audit data gathered at several diierent levels from the monitored system (e.g., system call level, command line level, and application level). Prool-ing les and programs will give us another dimension along which to characterize expected behavior on a system. And there still remains a signiicant amount of research to be done in determining exactly which aspects of behavior are most indicative of intrusions. To obtain meaningful indicators of intrusive behavior, such research needs to have available many examples of actual intrusions. A library of such examples does not currently exist and is needed. As …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research Plan

4 Current Research 4 4.1 Database Format . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4.2 Data Consolidation . . . . . . . . . . . . . . . . . . . . . . . . . 5 4.2.1 Optical Music Recognition . . . . . . . . . . . . . . . . . 6 4.2.2 MIDI Transcription . . . . . . . . . . . . . . . . . . . . . 6 4.2.3 Rhythm Quantization . . . . . . . . . . . . . . . . . . . 6 4.3 Audio Transcription ...

متن کامل

EBSeq: An R package for differential expression analysis using RNA-seq data

4 Quick Start 6 4.1 Gene level DE analysis (two conditions) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.1.1 Required input . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.1.2 Library size factor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.1.3 Running EBSeq on gene expression estimates . . . . . . . . . ....

متن کامل

The Kinetic Monte Carlo Method as a Way To Solve the Master Equation for Interstellar Grain Chemistry

4 Technical aspects of KMC 8 4.1 Representation of the grain . . . . . . . . . . 9 4.2 Input parameters in grain models: filling the table of events . . . . . . . . . . . . . . . . . 9 4.2.1 Sticking Fractions . . . . . . . . . . 10 4.2.2 Thermal desorption rates . . . . . . . 10 4.2.3 Diffusion rates . . . . . . . . . . . . 11 4.2.4 Theoretical determination of rates . . 13 4.3 Kinetic Monte C...

متن کامل

Observations and Projections: Cryosphere, Ocean Dynamics, and Hydrology

4. Observations and Projections: Cryosphere, Ocean Dynamics, and Hydrology Introduction 4.1 The Cryosphere 4.1.1 Antarctica 4.1.2 Greenland and Eurasian Ice Caps 4.1.3 Montane Glaciers 4.1.4 Sea and Lake Ice 4.2 Ocean Dynamics 4.2.1 Sea Level Change 4.2.2 Ocean Heat 4.2.3 Ocean Circulation 4.2.4 Africa 4.2.5 South America 4.2.6 Antarctica 4.2.7 Northern Hemisphere 4.2.8 Miscellaneous 4.3 Precip...

متن کامل

Experimental Setup and Models Validation

................................................................................................4.1 4.1 EXPERIMENTAL SETUP......................................................................4.2 4.2 AUTOMATED REACTORS...................................................................4.3 4.2.1 One Litre Reactor........................................................................................

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1993