Multi-Tier Intrusion Detection System

نویسندگان

  • Jun Li
  • Gerhard Eschelbeck
چکیده

There have been many different intrusion detection approaches, but none has been accurate enough to avoid false negatives and false positives. In this paper we propose a novel approach to more precisely deter mine whether or not an intrusion has happened. In this approach different intrusion detection techniques are smoothly integrated. This integrated system consists of a number of detectors, each sitting on a specific tier and employing a different intrusio n detection method. A detector has three main components: a consumer, a filter and a producer. The consumer collects signaling events from detectors at lower tiers or primary event sources and forwards them to the filter. The filter amplifies the intru sion signal and reduces the noise, and exports the resulting signaling events to the producer. From the producer, these signaling events are further exported to detectors at higher tiers, or directly to system administrators. This multi -tiered structure makes it possible to refine chaotic information from primitive sources from the bottom up, until system administrators on top finally receive a clear signal (if an intrusion does happen). This system is extensible a new detector, thus a new intrusion detec tion technique, can easily be incorporated by following interface specification for detector interaction. It is also configurableeach detector can configure its own policy by following internal detector interface. Finally, as long as communication authe nticity and secrecy between detectors can be guaranteed, this system can be readily distributed over multiple machines and geographic areas, further facilitating to detect intrusions that cross a wider area.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Poseidon: a 2-tier Anomaly-based Intrusion Detection System

We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system [22]. Our benchmarks on the 1999 DARPA data set [15] show a higher detection rate and lower number of false positives than PAYL and PHAD.

متن کامل

ar X iv : c s / 05 11 04 3 v 1 [ cs . C R ] 1 1 N ov 2 00 5 Poseidon : a 2 - tier Anomaly - based Intrusion Detection System ∗

We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system [22]. Our benchmarks on the 1999 DARPA data set [15] show a higher detection rate and lower number of false positives than PAYL and PHAD.

متن کامل

Performance Evaluation Approach for Multi-Tier Cloud Applications

Complex multi-tier applications deployed in cloud computing environments can experience rapid changes in their workloads. To ensure market readiness of such applications, adequate resources need to be provisioned so that the applications can meet the demands of specified workload levels and at the same time ensure that service level agreements are met. Multi-tier cloud applications can have com...

متن کامل

ar X iv : c s / 05 11 04 3 v 2 [ cs . C R ] 7 D ec 2 00 5 Poseidon : a 2 - tier Anomaly - based Network Intrusion Detection System ∗

We present Poseidon, a new anomaly based network intrusion detection system. Poseidon is payload-based, and has a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system [30]. Our benchmarks on the 1999 DARPA data set [22] show a higher detection rate and lower number of false positives than PAYL and PHAD.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001