Cooperative Intrusion Detection Model Based on State Transition Analysis

  • Authors:
  • Shaohua Teng;Wei Zhang;Xiufen Fu;Naiqi Wu

  • Affiliations:
  • Guangdong University of Technology, Guangzhou, Guangdong Province, P.R. China;Guangdong University of Technology, Guangzhou, Guangdong Province, P.R. China;Guangdong University of Technology, Guangzhou, Guangdong Province, P.R. China;Guangdong University of Technology, Guangzhou, Guangdong Province, P.R. China

  • Venue:
  • Computer Supported Cooperative Work in Design IV
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many intrusion behaviors can be characterized as the execution of a sequence of crucial commands that results in an unauthorized access. Lots of attack sequences can be derived by either exchanging properly orders of crucial commands or replacing crucial commands with the functionally similar commands, which have the same performance. Therefore, it is very difficult to detect such attacks. In this paper, we propose a cooperative intrusion detection model based on state transition analysis, in which the topological order and isomorphic transformation are adopted. For a given sequence of crucial commands of an intrusion, all the possible derived sequences as an intrusion scenario can be generated by means of the model. We may also use the model to detect the attacks from different cooperating attackers and the attacks from one attacker in different login sessions. Furthermore, a derived intrusion can be seen as an unknown intrusion, in this sense that the technique presented in this paper can detect some unknown intrusions.