Intrusion Detection Technologies: Index
Intrusion Detection Technologies: Index
Intrusion Detection Technologies: Index
Detection
Technologies
INDEX
CHAPTER ONE
INTRODUCTION
PAGE 1-2 BRIEF INTRODUCTION
CHAPTER TWO
LITERATURE SURVEY
PAGE 5 ANOMALY AND MISUSE DETECTION
PAGE 17 REFERENCES
ABSTRACT
Intrusion detection is a significant focus of research in the
security of computer systems and networks.
This paper presents an analysis of the progress being made in the
development of effective intrusion
detection systems for computer systems and distributed
computer networks. The technologies which are
discussed are designed to detect instances of the access of
computer systems by unauthorized individuals
and the misuse of system resources by authorized system users.
A review of the foundations of intrusion
detection systems and the methodologies which are the focus of
current development efforts are discussed.
Next, the paper
compares the performance of the five neural
network methods in intrusion detection.
CHAPTER 1
Introduction
4
alerts and control the sensors, and a central Engine the records
events logged by the sensors in a database and uses a system
of rules to generate alerts from security events received.
5
CHAPTER 2
LITERATURE SURVEY
RELATED WORK
Anomaly Detection
Anomaly detection is the general category of Intrusion
Detection, which works by identifying activities which vary
from established patterns for users, or groups of users.
Anomaly detection typically involves the creation of
knowledge bases which contain the profiles of the
monitored activities.
Misuse Detection
The second general approach to Intrusion Detection is
misuse detection. This technique involves the comparison
of a user's activities with the known behaviors of
attackers attempting to penetrate a system. Misuse
Detection also utilizes a knowledge base of information.
6
RULE BASED ANALYSIS
Most current approaches to the process of detecting
intrusions utilize some form of rule-based ANALYSIS. Rule-
Based analysis relies on sets of predefined rules that are
provided by anadministrator, automatically created by
the system, or both. The rules serve as operational
preconditions which are continuously checked in the audit
record by the intrusion detection mechanism. If the
required conditions of a rule are satisfied by user activity
the specified operation is executed. This approach was
unable to detect novel intrusion. A frequent update of
rules
is required in this approach that is time consuming.
Moreover, this approach was unable to detect new
attacks. Rule-based systems suffer from an inability to
detect attacks scenarios that may occur over an
extended period of time.
While the individual instances of suspicious activity may
be detected by the system, they may not be reported if
they appear to occur in isolation.
EXPERT SYSTEMS
Expert systems are the most common form of rule-based
intrusion detection approaches. The early intrusion
detection research efforts realized the inefficiency of any
approach that required a manual review of a system
audit trail.
While the information necessary to identify attacks was
believed to be present within the
voluminous audit data, an effective review of the material
required the use of an automated system.
7
The use of expert system techniques in intrusion
detection mechanisms was a significant milestone in the
development of effective and practical detection-based
information security systems.
An expert system consists of a set of rules that encode
the knowledge of a human "expert". These
rules are used by the system to make conclusions about
the security-related data from the intrusion detection
system. Expert systems permit the incorporation of an
extensive amount of human experience into a computer
application that then utilizes that knowledge to identify
activities that match the defined characteristics of misuse
and attack.
Unfortunately, expert systems require frequent updates
to remain current.
While expert systems offer an enhanced ability to review
audit data, the required updates may be ignored or
performed infrequently by the administrator.
At a minimum, this leads to an expert system with
reduced capabilities. At worst, this lack of maintenance
will degrade the security of the entire
system by causing the system's users to be misled into
believing that the system is secure, even
as one of the key components becomes increasingly
ineffective over time.
STATISTICAL APPROACH
This approach involves statistical comparison of
specific events based on a predetermined set of criteria.
The
data was collected from the system and the network. This
collected data was tested for attack analysis by statistical
models. The models which have been most frequently
used
include the Operational Mode.
11
Artificial neural networks have also been proposed for use
in the detection of computer
viruses.
Neural networks were proposed as statistical analysis
approaches in the detection of viruses
and malicious software in computer networks. The neural
network architecture may be a selforganizing
feature map which uses a single layer of neurons to
represent knowledge from a
particular domain in the form of a geometrically
organized feature map. The proposed network
was designed to learn the characteristics of normal
system activity and identify statistical
variations from the norm that may be an indication of a
virus.
While there is an increasing need for a system capable of
accurately identifying instances of
misuse on a network there is currently no applied
alternative to rule-based intrusion detection
systems. This method has been demonstrated to be
relatively effective if the exact characteristics
of the attack are known. However, network intrusions are
constantly changing because of
individual approaches taken by the attackers and regular
changes in the software and hardware of
the targeted systems. Because of the infinite variety of
attacks and attackers even a dedicated
effort to constantly update the rule base of an expert
system can never hope to accurately identify
the variety of intrusions.
The constantly changing nature of network attacks
requires a flexible defensive system that is
12
capable of analyzing the enormous amount of network
traffic in a manner which is less
structured than rule-based systems. A neural network-
based misuse detection system could
potentially address many of the problems that are found
in rule-based systems.
The aim of this work is to establish a framework that can
detect the known and the unknown
events of attacks and to choose the best algorithm
between nine algorithms which provides
minimum errors.
13