A framework for adaptive, cost-sensitive intrusion detection and response system

作者: Natalia Stakhanova

DOI: 10.31274/RTD-180813-16828

关键词: Software deploymentIntrusion detection systemAnomaly-based intrusion detection systemFalse positive paradoxDistributed computingAdaptation (computer science)Component (UML)Host-based intrusion detection systemComputer securityPreemptionEngineering

摘要: Intrusion detection has been at the center of intense research in last decade owing to rapid increase sophisticated attacks on computer systems. Typically, intrusion refers a variety techniques for detecting form malicious and unauthorized activities. There are three broad categories approaches: (a)  misuse-based technique that relies pre-specified attack signatures, (b) anomaly-based approach, typically depends normal patterns classifying any deviation from as malicious; (c)  specification-based although operates similar fashion anomaly-based employs model valid program behavior specifications requiring user expertise. When intrusive is detected, it desirable take (evasive and/or corrective) actions thwart ensure safety computing environment. Such countermeasures referred response. Although response component often integrated with Detection System (IDS), receives considerably less attention than IDS inherent complexity developing deploying an automated fashion. As such, traditionally, triggering left part administrators responsibility, high-degree In this work we present approach based monitoring abnormal behavior. The proposed effectively combines advantages approaches recognizing known through unknown using machine-learning algorithm. combination not only allows adaptation new patterns, but also provides method automatic development specifications. addition detection, our framework incorporates preemptive By preemption, imply before monitored pattern classified completely intrusion. deployment likely stop can affect system. However, preemption inherently suffers false positives; i.e., responses deployed deter correct execution which may look its initial phase. To reduce positives, have developed multi-phase selection mechanism evaluation cost information system damage caused by potential candidate responses.

参考文章(92)
D. Wagner, R. Dean, Intrusion detection via static analysis ieee symposium on security and privacy. pp. 156- 168 ,(2001) , 10.1109/SECPRI.2001.924296
Anil Somayaji, Stephanie Forrest, Automated response using system-call delays usenix security symposium. pp. 14- 14 ,(2000)
K.M.C. Tan, R.A. Maxion, "Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector ieee symposium on security and privacy. pp. 188- 201 ,(2002) , 10.1109/SECPRI.2002.1004371
Anil Somayaji, Steven A. Hofmeyr, Thomas A. Longstaff, Stephanie Forrest, A sense of self for Unix processes ieee symposium on security and privacy. pp. 120- 128 ,(1996) , 10.5555/525080.884258
C. Warrender, S. Forrest, B. Pearlmutter, Detecting intrusions using system calls: alternative data models ieee symposium on security and privacy. pp. 133- 145 ,(1999) , 10.1109/SECPRI.1999.766910
C. Ko, M. Ruschitzka, K. Levitt, Execution monitoring of security-critical programs in distributed systems: a specification-based approach ieee symposium on security and privacy. pp. 175- 187 ,(1997) , 10.1109/SECPRI.1997.601332
H. Debar, M. Becker, D. Siboni, A neural network component for an intrusion detection system ieee symposium on security and privacy. pp. 240- 250 ,(1992) , 10.1109/RISP.1992.213257
Bernhard Schölkopf, John C. Platt, John Shawe-Taylor, Alex J. Smola, Robert C. Williamson, Estimating the Support of a High-Dimensional Distribution Neural Computation. ,vol. 13, pp. 1443- 1471 ,(2001) , 10.1162/089976601750264965
David Wagner, Paolo Soto, Mimicry attacks on host-based intrusion detection systems Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 255- 264 ,(2002) , 10.1145/586110.586145
D.J. Ragsdale, C.A. Carver, J.W. Humphries, U.W. Pooch, Adaptation techniques for intrusion detection and intrusion response systems systems man and cybernetics. ,vol. 4, pp. 2344- 2349 ,(2000) , 10.1109/ICSMC.2000.884341