High-Performance Agent System for Intrusion Detection in Backbone Networks

  • Authors:
  • Martin Rehák;Michal Pěchouček;Pavel Čeleda;Vojtěch Krmíček;Jiří Moninec;Tomáš Dymáček;David Medvigy

  • Affiliations:
  • Department of Cybernetics and Center for Applied Cybernetics, Faculty of Electrical Engineering, Czech Technical University in Prague, Technická 2, 166 27 Prague, Czech Republic;Department of Cybernetics and Center for Applied Cybernetics, Faculty of Electrical Engineering, Czech Technical University in Prague, Technická 2, 166 27 Prague, Czech Republic;Institute of Computer Science, Masaryk University, Botanická 68a, 602 00 Brno, Czech Republic;Institute of Computer Science, Masaryk University, Botanická 68a, 602 00 Brno, Czech Republic;Institute of Computer Science, Masaryk University, Botanická 68a, 602 00 Brno, Czech Republic;Institute of Computer Science, Masaryk University, Botanická 68a, 602 00 Brno, Czech Republic;Department of Cybernetics and Center for Applied Cybernetics, Faculty of Electrical Engineering, Czech Technical University in Prague, Technická 2, 166 27 Prague, Czech Republic

  • Venue:
  • CIA '07 Proceedings of the 11th international workshop on Cooperative Information Agents XI
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a design of high-performance agent-based intrusion detection system designed for deployment on high-speed network links. To match the speed requirements, wire-speed data acquisition layer is based on hardware-accelerated NetFlow like probe, which provides overview of current network traffic. The data is then processed by detection agents that use heterogenous anomaly detection methods. These methods are correlated by means of trust and reputation models, and the conclusions regarding the maliciousness of individual network flows is presented to the operator via one or more analysis agents, that automatically gather supplementary information about the potentially malicious traffic from remote data sources such as DNS, whois or router configurations. Presented system is designed to help the network operators efficiently identify malicious flows by automating most of the surveillance process.