Transaction-based anomaly detection

  • Authors:
  • Roland Büschkes;Mark Borning;Dogan Kesdogan

  • Affiliations:
  • Aachen University of Technology - Department of Computer Science, Aachen, Germany;Aachen University of Technology - Department of Computer Science, Aachen, Germany;o.tel.o communications GmbH & Co, Dept. Enterprise Security, Kööln

  • Venue:
  • ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

The increasing complexity of both tele and data communication networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse by in- and outsiders is becoming more and more difficult. This paper deals with a new technique that appears to be suitable for solving these issues, i.e. anomaly detection based on the specification of transactions. The traditional transaction and serialization concepts are discussed, and a new model of anomaly detection, based on the concept of transactions, is introduced. Applying this model to known attacks gives a first insight concerning the feasibility of our approach.