Watcher: The Missing Piece of the Security Puzzle

  • Authors:
  • J. Munson;S. Wimer

  • Affiliations:
  • -;-

  • Venue:
  • ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

Modern intrusion detection systems are comprisedof three basically different approaches, host based,network based, and a third relatively recent additioncalled procedural based detection. The first two havebeen extremely popular in the commercial market for anumber of years now because they are relatively simpleto use, understand and maintain. However, they fallprey to a number of shortcomings such as scaling withincreased traffic requirements, use of complex and falsepositive prone signature databases, and their inability todetect novel intrusive attempts. The procedural basedintrusion detection systems represent a great leapforward over current security technologies by addressingthese and other concerns. This paper presents anoverview of our work in creating a true proceduralDisallowed Operational Anomaly (DOA) system.