The intrusion detection system AID—architecture, and experiences in automated audit analysis

作者: Michael Sobirey , Birk Richter , Hartmut König

DOI: 10.1007/978-0-387-35083-7_25

关键词: Computer securityIntrusion detection systemAnomaly detectionAuditComputer scienceNetwork securityArchitecture

摘要: Intrusion detection systems identify unauthorized use, misuse and abuse of computer systems. Some applications have shown that they are capable detecting a large amount security violations. The network based attacks, however, has been solved insufficiently. In addition there inaccessibilities concerning privacy the monitored users. this paper we present intrusion system AID which provides new features for oriented auditing, sophisticated real-time analysis using knowledge techniques. describes objectives main development.

参考文章(11)
Phil Porras, STAT -- A State Transition Analysis Tool For Intrusion Detection University of California at Santa Barbara. ,(1993)
C.A. Stallings, K.A. Jackson, D.H. Dubois, An expert system application for network intrusion detection ,(1991)
Jeffrey L. Elman, Representation and structure in connectionist models Cognitive models of speech processing. pp. 345- 382 ,(1991) , 10.21236/ADA259504
S.E. Smaha, Haystack: an intrusion detection system annual computer security applications conference. pp. 37- 44 ,(1988) , 10.1109/ACSAC.1988.113412
D.E. Denning, An Intrusion-Detection Model IEEE Transactions on Software Engineering. ,vol. 13, pp. 222- 232 ,(1987) , 10.1109/TSE.1987.232894
P. Proctor, Audit reduction and misuse detection in heterogeneous environments: framework and application annual computer security applications conference. pp. 117- 125 ,(1994) , 10.1109/CSAC.1994.367315
K. Ilgun, USTAT: a real-time intrusion detection system for UNIX ieee symposium on security and privacy. pp. 16- 28 ,(1993) , 10.1109/RISP.1993.287646
Optimal Quantization, Kl Coefficients, Reflection Coefficients, A. real-time ,(1982)
M. Jordan, Attractor dynamics and parallelism in a connectionist sequential machine conference cognitive science. pp. 513- 546 ,(1986)