An Ontology-supported Outbound Intrusion Detection System

نویسنده

  • Salvador Mandujano
چکیده

Outbound intrusion detection is a systems vigilance approach that aims at limiting the effects of a security threat by collectively scrutinizing outgoing traffic and local system activity. This paper summarizes the design and implementation of FROID, an outbound intrusion detection prototype built with agent technology that exploits the semantic power of ontologies in order to enable collaboration mechanisms among agent colonies responsible for the generation and identification of attack program signatures. The system supports cascade monitoring and a peerto-peer multiagent organization. Entities and interactions are captured by means of an attacker-centric ontology, which provides agents with a common interpretation of the environment. The ontology also stores the representation of process and network traffic signatures built using entropy analysis information. Signatures are matched through a data structure based on the internals of the Snort network intrusion detection tool. The prototype employs FIPA-compatible agent technology as well as data representation model built with the OWL ontology definition semantic-Web language. We show the benefits of using an ontological model to support intrusion detection and explore the possibilities of a selfish, collaborative approach to computer monitoring.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identifying Attack Code through an Ontology-Based Multiagent Tool: FROID

This paper describes the design and results of FROID, an outbound intrusion detection system built with agent technology and supported by an attacker-centric ontology. The prototype features a misuse-based detection mechanism that identifies remote attack tools in execution. Misuse signatures composed of attributes selected through entropy analysis of outgoing traffic streams and process runtim...

متن کامل

Identifying Attack Code through an Ontology-Based Multiagent Tool: FROID

This paper describes the design and results of FROID, an outbound intrusion detection system built with agent technology and supported by an attacker-centric ontology. The prototype features a misuse-based detection mechanism that identifies remote attack tools in execution. Misuse signatures composed of attributes selected through entropy analysis of outgoing traffic streams and process runtim...

متن کامل

An Ontology-based Multiagent Architecture for Outbound Intrusion Detection

Even when the benefits of using knowledge representation and management techniques have been already acknowledged by the intrusion detection community, little has been done to enable security technologies with them. We present an ontology-based multiagent architecture that implements Outbound Intrusion Detection, an intrusion detection approach concerned not with protecting local hosts from bei...

متن کامل

A Comprehensive Study on Classification of Passive Intrusion and Extrusion Detection System

Cyber criminals compromise Integrity, Availability and Confidentiality of network resources in cyber space and cause remote class intrusions such as U2R, R2L, DoS and probe/scan system attacks .To handle these intrusions, Cyber Security uses three audit and monitoring systems namely Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS). Intrusion Detection System (IDS) monitors ...

متن کامل

Hybrid Intrusion Detection with Weighted Signature Generation

An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system IDS. Since IDS only works by matching the incoming transaction record with its predefined attack patterns stored in the database, it is necessary to develop a system whi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005