A Service Oriented Modeling and Analysis for Building Intrusion Detection Systems

作者: Rama Rao K.V.S.N. , Manas Ranjan Patra

DOI: 10.1007/978-3-642-29219-4_75

关键词: Packet analyzerHackerService-oriented modelingComputer securityComplex networkInformation sensitivityComputer networkEnterprise private networkNetwork packetIntrusion detection systemComputer science

摘要: Now-a-days all the major business activities of an enterprise are driven by complex networks. Despite fact that diversified networking technologies implemented, networks have become leaky. Also hackers, displeased employees, unethical firms and terrorist organizations influencing trying to penetrate into network gather sensitive information. Hence becoming more vulnerable as a result attacks on intensifying. Although firewalls routers deployed, they self deficient. Intrusion detection systems monitor inspect packets traversing over ensuring deep packet analysis. But sophisticated, IDS available today unable address challenges surround different types attacks, since designed handle specific only. It is evident no single technique can guarantee protection against future attacks. there need for integrated architecture which provide robust complete spectrum threats. In this paper, we propose our service oriented modeling based paradigm building intrusion systems.

参考文章(12)
PJ Bentley, J Kim, An artificial immune model for network intrusion detection soft computing. ,(1999)
Emilie Lundin, Erland Jonsson, Survey of Intrusion Detection Research Chalmers University of Technology. ,(2002)
A. Berqia, G. Nacsimento, A distributed approach for intrusion detection systems Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004.. pp. 493- 494 ,(2004) , 10.1109/ICTTA.2004.1307847
Yoon-Keun Oh, Seung-Hyun Paek, Do-Hoon Lee, JooBeom Yun, The Architecture of Host-based Intrusion Detection Model Generation System for the Frequency Per System Call international conference on hybrid information technology. ,vol. 2, pp. 277- 283 ,(2006) , 10.1109/ICHIT.2006.235
Animesh Patcha, Jung-Min Park, None, An overview of anomaly detection techniques: Existing solutions and latest technological trends Computer Networks. ,vol. 51, pp. 3448- 3470 ,(2007) , 10.1016/J.COMNET.2007.02.001
Vishal Dwivedi, Naveen Kulkarni, A Model Driven Service Identification Approach for Process Centric Systems ieee congress on services. pp. 65- 72 ,(2008) , 10.1109/SERVICES-2.2008.16
D.E. Denning, An Intrusion-Detection Model IEEE Transactions on Software Engineering. ,vol. 13, pp. 222- 232 ,(1987) , 10.1109/TSE.1987.232894