Using active intrusion detection to recover network trust

  • Authors:
  • John F. Williamson;Sergey Bratus;Michael E. Locasto;Sean W. Smith

  • Affiliations:
  • Dartmouth College;Dartmouth College;University of Calgary;Dartmouth College

  • Venue:
  • LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most existing intrusion detection systems take a passive approach to observing attacks or noticing exploits. We suggest that active intrusion detection (AID) techniques provide value, particularly in scenarios where an administrator attempts to recover a network infrastructure from a compromise. In such cases, an attacker may have corrupted fundamental services (e.g., ARP, DHCP, DNS, NTP), and existing IDS or auditing tools may lack the precision or pervasive deployment to observe symptoms of this corruption. We prototype a specific instance of the active intrusion detection approach: how we can use an AID mechanism based on packet injection to help detect rogue services.