S Independent and Comprehensive Intrusion Detection Management

نویسنده

  • Björn-C. Bösch
چکیده

Coverage of services and configuration influence the efficiency of Intrusion Detection Systems (IDS). Today, IDS have vendor-specific configurations and this limits a wide coverage of services by IDS. Operations might become complex, in case of usage of multiple systems. Efforts and frame conditions for a multi-vendor IDS implementation under one central administration and notification entity will be demonstrated. This solution provides administrators one consistent front-end for all integrated IDS. The security level will be improved by one central administration entity for the complete IDS solution independent of the respective IDS vendor. Updates and parameter modifications could be done from this supervising point. There is still no constraint to allow a connection from any analyzer to the Internet or the central operations LAN for notifications or to update itself. Managers are independent from the rest of the IDS. IDS of different vendors and analyzing levels are able to manage with one administration interface.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Method for Intrusion Detection Using Genetic Algorithm and Neural Network

    The article attempts to have neural network and genetic algorithm techniques present a model for classification on dataset. The goal is design model can the subject acted a firewall in network and this model with compound optimized algorithms create reliability and accuracy and reduce error rate couse of this is article use feedback neural network and compared to previous methods increase a...

متن کامل

A New Method for Intrusion Detection Using Genetic Algorithm and Neural Network

    The article attempts to have neural network and genetic algorithm techniques present a model for classification on dataset. The goal is design model can the subject acted a firewall in network and this model with compound optimized algorithms create reliability and accuracy and reduce error rate couse of this is article use feedback neural network and compared to previous methods increase a...

متن کامل

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

Intrusion Detection: Systems and Models

Organizations more ofien than not lack comprehensive security policies and are not adequately prepared to protect their systems against intrusions. This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classification of literature pertaining to intrusion detection.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012