Network-based Intrusion Detection-Modeling for a Larger Picture

  • Authors:
  • Affiliations:
  • Venue:
  • LISA '02 Proceedings of the 16th USENIX conference on System administration
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Internet is changing computing more than ever before. As the possibilities and the scopes are limitless, so too are the risks and chances of malicious intrusions. Due to the increased connectivity and the vast spectrum of financial possibilities, more and more systems are subject to attack by intruders. One of the commonly used method for intrusion detection is based on anomaly. Network based attacks may occur at various levels, from application to link levels. So the number of potential attackers or intruders are extremely large and thus it is almost impossible to "profile" entities and detect intrusions based on anomalies in host-based profiles. Based on meta-information, logical groupings has been made for the alerts that belongs to same logical network, to get a clearer and boarder view of the perpetrators. To reduce the effect of probably insignificant alerts a threshold technique is used.