As ISO IEC 15947-2004 Information Technology - Security Techniques - IT Intrusion Detection Framework
As ISO IEC 15947-2004 Information Technology - Security Techniques - IT Intrusion Detection Framework
As ISO IEC 15947-2004 Information Technology - Security Techniques - IT Intrusion Detection Framework
ISO/IEC TR 15947:2002
AS ISO/IEC 15947
Australian Standard™
This is a free 7 page sample. Access the full version at http://infostore.saiglobal.com.
Information technology—Security
techniques—IT intrusion detection
framework
This Australian Standard was prepared by Committee IT-012, Information
systems—Security and identification technology. It was approved on behalf of the
Council of Standards Australia on 29 January 2004 and published on
17 March 2004.
Australian Standard™
This is a free 7 page sample. Access the full version at http://infostore.saiglobal.com.
Information technology—Security
techniques—IT intrusion detection
framework
COPYRIGHT
© Standards Australia International
All rights are reserved. No part of this work may be reproduced or copied in any form or by any
means, electronic or mechanical, including photocopying, without the written permission of the
publisher.
Published by Standards Australia International Ltd
GPO Box 5420, Sydney, NSW 2001, Australia
ISBN 0 7337 5764 2
ii
PREFACE
This Standard was prepared by the Australian members of the Joint Standards Australia/Standards
New Zealand Committee IT-012, Information systems—Security and identification technology. After
consultation with stakeholders in both countries, Standards Australia and Standards New Zealand
decided to develop this Standard as an Australian, rather than an Australian/New Zealand Standard.
This Standard is identical with, and has been reproduced from ISO/IEC TR 15947:2002, Information
technology—Security techniques—IT intrusion detection framework.
The objective of this Standard is to provide a framework for detection of intrusions in IT systems.
As this Standard is reproduced from an international standard, the following applies:
(a) Its number appears on the cover and title page while the international standard number appears
only on the cover.
This is a free 7 page sample. Access the full version at http://infostore.saiglobal.com.
(b) In the source text ‘this Technical Report (TR)’ should read ‘this Australian Standard’.
(c) A full point substitutes for a comma when referring to a decimal marker.
References to International Standards should be replaced by references to Australian or
Australian/New Zealand Standards, as follows:
CONTENTS
Page
1 Scope.................................................................................................................................................1
2 References.........................................................................................................................................2
3 Terms and Definitions...................................................................................................................2
4 Introduction to Intrusion Detection ...................................................................................................2
4.1 The Need for Intrusion Detection..............................................................................................2
4.2 Types of Attacks .......................................................................................................................3
4.2.1 Host-based Attacks............................................................................................................4
4.2.2 Network-based Attacks .....................................................................................................4
5 Generic Model of Intrusion Detection Process .............................................................................4
5.1 Data Sources .............................................................................................................................5
5.2 Event Detection.........................................................................................................................6
This is a free 7 page sample. Access the full version at http://infostore.saiglobal.com.
5.3 Analysis.....................................................................................................................................6
5.4 Response ................................................................................................................................. 7
5.5 Data Storage............................................................................................................................ 7
6 Characteristics of Intrusion Detection............................................................................................. 7
6.1 Data Source............................................................................................................................. 8
6.1.1 Host-based....................................................................................................................... 8
6.1.2 Network-based ................................................................................................................ 9
6.2 Event Detection and Analysis Frequency................................................................................ 9
6.2.1 Continuous/Near Real-Time............................................................................................ 9
6.2.2 Periodically/Batch Processed .......................................................................................... 9
6.2.3 Initiated Only Under Special Circumstances................................................................... 9
6.3 Intrusion Detection Analysis ................................................................................................... 9
6.3.1 Misuse-based...................................................................................................................10
6.3.2 Anomaly-based................................................................................................................10
6.4 Response Behavior..................................................................................................................10
6.4.1 Passive.............................................................................................................................10
6.4.2 Active..............................................................................................................................10
7 Architecture Considerations............................................................................................................11
8 Management of an IDS ...................................................................................................................12
8.1 Configuration Management.....................................................................................................12
8.1.1 Detection Function ..........................................................................................................12
8.1.2 Response Function ..........................................................................................................12
8.2 Security Services Management ...............................................................................................12
8.3 Integration with Other Management Systems..........................................................................12
8.4 Security of Management Operations ......................................................................................13
8.4.1 Authentication .................................................................................................................13
8.4.2 Integrity...........................................................................................................................13
8.4.3 Confidentiality.................................................................................................................13
8.4.4 Availability......................................................................................................................13
8.5 Management Model ................................................................................................................13
9 Intrusion Detection Analysis ...........................................................................................................14
9.1 Signature Analysis...................................................................................................................14
9.2 Statistical Approach ................................................................................................................15
9.3 Expert Systems........................................................................................................................16
9.4 State-transition Analysis..........................................................................................................16
9.5 Neural Networks .....................................................................................................................16
9.6 User Anomalous Behavior Identification ................................................................................16
9.7 Hybrid Analysis ......................................................................................................................16
9.8 Other .......................................................................................................................................16
10 Implementation and Deployment Issues......................................................................................17
10.1 Efficiency ................................................................................................................................17
10.2 Functionality ...........................................................................................................................17
iv
Page
AUSTRALIAN STANDARD
1 Scope
This is a free 7 page sample. Access the full version at http://infostore.saiglobal.com.
This is a Type 3 Technical Report (TR), which defines a framework for detection of intrusions in IT
systems. Many classes of intrusions are considered. These include intrusions that are intentional or
unintentional, legal or illegal, harmful or harmless and unauthorized access by insiders or outsiders. The
TR focuses on:
• establishing common definitions for terms and concepts associated with an IT intrusion detection
framework,
• discussing common types of input data and the sources needed for an effective intrusion detection
capability,
This framework explains intrusion detection terms and concepts and describes the relationship among
them. Further, the framework addresses possible ordering of intrusion detection tasks and related
activities.
This TR provides the basis for a common understanding of intrusion detection. This material aims to
assist IT managers to deploy within their organizations Intrusion Detection Systems (IDS) that interact
and work together. This TR should facilitate collaboration among organizations across the world where
collaboration is desired and/or essential to counter intrusion attempts.
This framework document is not intended to cover every possible detail involved in intrusion detection,
such as detailed attack patterns, or statistical anomalies, or the many configurations that an IDS could
have.