Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/645838.670720guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Adaptive, Model-Based Monitoring for Cyber Attack Detection

Published: 02 October 2000 Publication History

Abstract

Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack specificity, but may not be able to generalize. The latter detect attacks probabilistically, allowing for generalization potential. However, they lack attack models and can potentially "learn" to consider an attack normal.
Herein, we present a high-performance, adaptive, model-based technique for attack detection, using Bayes net technology to analyze bursts of traffic. Attack classes are embodied as model hypotheses, which are adaptively reinforced. This approach has the attractive features of both signature based and statistical techniques: model specificity, adaptability, and generalization potential. Our initial prototype sensor examines TCP headers and communicates in IDIP, delivering a complementary inference technique to an IDS sensor suite. The inference technique is itself suitable for sensor correlation.

References

[1]
Porras, P. and Neumann, P. "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Distrurbances", National Information Security Conference, 1997. http://www.sdl.sri.com/emerald/emerald-niss97.html
[2]
Valdes, A. and Anderson, D. "Statistical Methods for Computer Usage Anomaly Detection", Third International Workshop on Rough Sets and Soft Computing, San Jose, CA, 1995.
[3]
P. A. Porras and A. Valdes. Live traffic analysis of TCP/IP gateways. In Proceedings of the Symposium on Network and Distributed System Security. Internet Society, March 1998.
[4]
Pearl, J. "Probabilistic Reasoning in Intelligent Systems", Morgan-Kaufman (1988).
[5]
Boyen, X. and Koller, D. "Tractable Inference for Complex Stochastic Processes", Proceedings of the 14th Annual Conference on Uncertainty in Artificial Intelligence (UAI-98), Madison, WI, July 1998. http://robotics.Stanford.EDU/xb/uai98/index.html
[6]
Skinner, K. and Valdes, A. "EMERALD#8482; TCP Statistical Analyzer 1998 Evaluation Results", http://www.sdl.sri.com/emerald/98-eval-estat/index.html
[7]
Lippmann, Richard P., et al. "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation," Proceedings of DARPA Information Survivability Conference and Exposition, DISCEX'00, Jan 25-27, Hilton Head, SC, 2000, http://www.ll.mit.edu/IST/ideval/index.html

Cited By

View all
  • (2022)A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and InsightsACM Computing Surveys10.1145/353080955:5(1-37)Online publication date: 3-Dec-2022
  • (2020)Hybrid deep neural networks to infer state models of black-box systemsProceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering10.1145/3324884.3416559(299-311)Online publication date: 21-Dec-2020
  • (2019)An empirical study on practicality of specification mining algorithms on a real-world applicationProceedings of the 27th International Conference on Program Comprehension10.1109/ICPC.2019.00020(65-69)Online publication date: 25-May-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
RAID '00: Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
October 2000
226 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 02 October 2000

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2022)A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and InsightsACM Computing Surveys10.1145/353080955:5(1-37)Online publication date: 3-Dec-2022
  • (2020)Hybrid deep neural networks to infer state models of black-box systemsProceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering10.1145/3324884.3416559(299-311)Online publication date: 21-Dec-2020
  • (2019)An empirical study on practicality of specification mining algorithms on a real-world applicationProceedings of the 27th International Conference on Program Comprehension10.1109/ICPC.2019.00020(65-69)Online publication date: 25-May-2019
  • (2018)Network anomaly detection based on probabilistic analysisSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-017-2679-322:20(6621-6627)Online publication date: 1-Oct-2018
  • (2015)Self-Similar Magneto-Electric Nanocircuit Technology for Probabilistic Inference EnginesIEEE Transactions on Nanotechnology10.1109/TNANO.2015.243961814:6(980-991)Online publication date: 9-Nov-2015
  • (2015)Hybrid intelligent systems for detecting network intrusionsSecurity and Communication Networks10.1002/sec.5928:16(2741-2749)Online publication date: 10-Nov-2015
  • (2013)Assessing the genuineness of events in runtime monitoring of cyber systemsComputers and Security10.1016/j.cose.2013.03.01138(76-96)Online publication date: 1-Oct-2013
  • (2012)Multi-stage attack detection algorithm based on hidden markov modelProceedings of the 2012 international conference on Web Information Systems and Mining10.1007/978-3-642-33469-6_37(275-282)Online publication date: 26-Oct-2012
  • (2011)Motif-based attack detection in network communication graphsProceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security10.5555/2046108.2046139(206-213)Online publication date: 19-Oct-2011
  • (2009)Optimizing network anomaly detection scheme using instance selection mechanismProceedings of the 28th IEEE conference on Global telecommunications10.5555/1811380.1811451(425-431)Online publication date: 30-Nov-2009
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media