https://scholars.lib.ntu.edu.tw/handle/123456789/456091
Title: | Cross-level behavioral analysis for robust early intrusion detection | Authors: | Hsiao, S.-W. YEALI SUN Chen, M.C. Zhang, H. |
Keywords: | Anomaly detection; Attack assessment; Cross-level behaviorial analysis; Finite state machine; Network protocol | Issue Date: | 2010 | Start page/Pages: | 95-100 | Source: | 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security | Abstract: | We anticipate future attacks would evolve to become more sophisticated to outwit existing intrusion detection techniques. Existing anomaly analysis techniques and signature-based detection practices can no longer effective. We believe intrusion detection systems (IDSs) of the future will need to be capable to detect or infer attacks based on more valuable information from the network-related properties and characteristics. We observed that even though the signatures or traffic patterns of future stealthy attacks can be modified to outwit current IDSs, certain behavioral aspects of an attack are invariant. We propose a novel approach that jointly monitors network activities at three different levels: transport layer protocols, (vulnerable) network services, and invariant anomaly behaviors (called attack symptoms). Our system, SecMon, captures the network behaviors by simultaneously performing cross-level state correlation for effective detection of anomaly behaviors. For the most part, the invariant anomaly behavior has not been fully exploited in the past. A probabilistic attack inference model is also proposed for attack assessment by correlating the observed attack symptoms to achieve the low false alarm rate. The evaluations demonstrate our prototype system is efficient and effective for sophisticated attacks, including polymorphism, stealthy, and unknown attack. © 2010 IEEE. |
URI: | https://scholars.lib.ntu.edu.tw/handle/123456789/456091 | DOI: | 10.1109/ISI.2010.5484768 | SDG/Keyword: | Analysis techniques; Anomaly detection; Attack assessment; Behavioral analysis; False alarm rate; Finite state machines; Inference models; Intrusion Detection Systems; Network activities; Network behaviors; Network services; Prototype system; Traffic pattern; Transport layer protocols; Computer crime; Contour followers; Information science; Network protocols; Network security; Intrusion detection |
Appears in Collections: | 資訊管理學系 |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.