Cooperative intrusion detection model based on state transition analysis
S Teng, W Zhang, X Fu, N Wu - International Conference on Computer …, 2007 - Springer
S Teng, W Zhang, X Fu, N Wu
International Conference on Computer Supported Cooperative Work in Design, 2007•SpringerMany intrusion behaviors can be characterized as the execution of a sequence of crucial
commands that results in an unauthorized access. Lots of attack sequences can be derived
by either exchanging properly orders of crucial commands or replacing crucial commands
with the functionally similar commands, which have the same performance. Therefore, it is
very difficult to detect such attacks. In this paper, we propose a cooperative intrusion
detection model based on state transition analysis, in which the topological order and …
commands that results in an unauthorized access. Lots of attack sequences can be derived
by either exchanging properly orders of crucial commands or replacing crucial commands
with the functionally similar commands, which have the same performance. Therefore, it is
very difficult to detect such attacks. In this paper, we propose a cooperative intrusion
detection model based on state transition analysis, in which the topological order and …
Abstract
Many intrusion behaviors can be characterized as the execution of a sequence of crucial commands that results in an unauthorized access. Lots of attack sequences can be derived by either exchanging properly orders of crucial commands or replacing crucial commands with the functionally similar commands, which have the same performance. Therefore, it is very difficult to detect such attacks. In this paper, we propose a cooperative intrusion detection model based on state transition analysis, in which the topological order and isomorphic transformation are adopted. For a given sequence of crucial commands of an intrusion, all the possible derived sequences as an intrusion scenario can be generated by means of the model. We may also use the model to detect the attacks from different cooperating attackers and the attacks from one attacker in different login sessions. Furthermore, a derived intrusion can be seen as an unknown intrusion, in this sense that the technique presented in this paper can detect some unknown intrusions.
Springer
Showing the best result for this search. See all results