欢迎来到天天文库
浏览记录
ID:34525266
大小:152.25 KB
页数:8页
时间:2019-03-07
《grids--a graph-based intrusion detection system for large networksnew》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、GrIDS{AGraph-BasedIntrusionDetectionSystemforLargeNetworksMarch4,1996AbstractThereiswidespreadconcernthatlarge-scalemaliciousattacksoncomputernet-workscoulddisruptacountry'seconomyandposeathreattoitsnationalsecurity.WepresentthedesignofGrIDS(Graph-BasedIntrusionDetectionSystem).GrIDSwi
2、llcollectdataaboutactivityoncomputersandnetworktracbetweenthem.Itwillaggregatethisinformationintoactivitygraphswhichapproximatelyrepresentthecausalstructureofnetworkactivity.Thiswillallowlarge-scaleautomatedattackstobedetectedinnearreal-time.Inaddition,GrIDSwillallownetworkadministrat
3、orstostatepoliciesspecifyingwhichusersmayuseparticularservicesofindividualhostsorgroupsofhosts.Byanalyzingthecharacteristicsoftheactivitygraphs,GrIDSwilldetectandreportviolationsofthestatedpolicy.GrIDSwilluseahierarchicalreduc-tionschemeforitsgraphs,whichwillallowittoscaletolargenetwor
4、kapplications.AnearlyprototypeofGrIDShassuccessfullydetectedawormattack.Keywords:Intrusiondetection,networks,informationwarfare,computersecurity,graphs.1Introduction1.1BackgroundDevelopedcountriesareincreasinglydependentontelephoneandcomputernetworksforallaspectsoftheirdailylife.IntheU
5、nitedStates,thetelephonenetworkhaslongbeencriticalformilitarycommu-nicationandemergencyciviliancommunication(911).NinetypercentofU.S.governmenttelephoneserviceisprovidedbycommercialnetworks[1],includingmuchtracofmilitarysignicance.TheInternetandotherTCP/IPnetworksarebecomingincreasin
6、glyimportantbothtocommerceandtothegovernment.ManyorganizationsarestartingtousetheWorldWideWebasaprimarymeanstodisseminateinformation,bothinternallyandexternally.Electroniccommerce,wherenancialtransactionsareconductedviatheInternet,willbeinwidespreadusewithinafewyears.Boththepublictele
7、phonenetworksandtheInternetarebasedonfundamentallyinsecureprotocolsandtechnology.Theyarealsointimatelyconnected:manytelephoneswitches1arealsocomputersystemsattachedtotheInternet,andthereislittlesecurityprotectingthoseswitches.Anattackercanmanipulatethematwill,misroutingcallsandpotent
此文档下载收益归作者所有