Multi-Tier Intrusion Detection System
نویسندگان
چکیده
There have been many different intrusion detection approaches, but none has been accurate enough to avoid false negatives and false positives. In this paper we propose a novel approach to more precisely deter mine whether or not an intrusion has happened. In this approach different intrusion detection techniques are smoothly integrated. This integrated system consists of a number of detectors, each sitting on a specific tier and employing a different intrusio n detection method. A detector has three main components: a consumer, a filter and a producer. The consumer collects signaling events from detectors at lower tiers or primary event sources and forwards them to the filter. The filter amplifies the intru sion signal and reduces the noise, and exports the resulting signaling events to the producer. From the producer, these signaling events are further exported to detectors at higher tiers, or directly to system administrators. This multi -tiered structure makes it possible to refine chaotic information from primitive sources from the bottom up, until system administrators on top finally receive a clear signal (if an intrusion does happen). This system is extensible a new detector, thus a new intrusion detec tion technique, can easily be incorporated by following interface specification for detector interaction. It is also configurableeach detector can configure its own policy by following internal detector interface. Finally, as long as communication authe nticity and secrecy between detectors can be guaranteed, this system can be readily distributed over multiple machines and geographic areas, further facilitating to detect intrusions that cross a wider area.
منابع مشابه
MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملPoseidon: a 2-tier Anomaly-based Intrusion Detection System
We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system [22]. Our benchmarks on the 1999 DARPA data set [15] show a higher detection rate and lower number of false positives than PAYL and PHAD.
متن کاملar X iv : c s / 05 11 04 3 v 1 [ cs . C R ] 1 1 N ov 2 00 5 Poseidon : a 2 - tier Anomaly - based Intrusion Detection System ∗
We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system [22]. Our benchmarks on the 1999 DARPA data set [15] show a higher detection rate and lower number of false positives than PAYL and PHAD.
متن کاملPerformance Evaluation Approach for Multi-Tier Cloud Applications
Complex multi-tier applications deployed in cloud computing environments can experience rapid changes in their workloads. To ensure market readiness of such applications, adequate resources need to be provisioned so that the applications can meet the demands of specified workload levels and at the same time ensure that service level agreements are met. Multi-tier cloud applications can have com...
متن کاملar X iv : c s / 05 11 04 3 v 2 [ cs . C R ] 7 D ec 2 00 5 Poseidon : a 2 - tier Anomaly - based Network Intrusion Detection System ∗
We present Poseidon, a new anomaly based network intrusion detection system. Poseidon is payload-based, and has a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system [30]. Our benchmarks on the 1999 DARPA data set [22] show a higher detection rate and lower number of false positives than PAYL and PHAD.
متن کامل