RAID 2003 - Research in Attacks, Intrusions, and Defenses

N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.

Abstract

Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack specificity, but may not be able to generalize. The latter detect attacks probabilistically, allowing for generalization potential. However, they lack attack models and can potentially learn to consider an attack normal. Herein, we present a high-performance, adaptive, model-based technique for attack detection, using Bayes net technology to analyze bursts of traffic. Attack classes are embodied as model hypotheses, which are adaptively reinforced. This approach has the attractive features of both signature based and statistical techniques: model specificity, adaptability, and generalization potential. Our initial prototype sensor examines TCP headers and communicates in IDIP, delivering a complementary inference technique to an IDS sensor suite. The inference technique is itself suitable for sensor correlation.

Cite

CITATION STYLE

APA

Vigna, G., Kruegel, C., & Jonsson, E. (Eds.). (2003). RAID 2003 - Research in Attacks, Intrusions, and Defenses (Vol. 2820). Springer Berlin Heidelberg. Retrieved from http://link.springer.com/10.1007/b13476

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free