Analysis of distributed intrusion detection systems using Bayesian methods

被引:15
作者
Burroughs, DJ [1 ]
Wilson, LF [1 ]
Cybenko, GV [1 ]
机构
[1] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
来源
CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE | 2002年
关键词
D O I
10.1109/IPCCC.2002.995166
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In computer and network security, standard approaches to intrusion detection and response attempt to detect and prevent individual attacks. However, it is not the attack but rather the attacker against which our networks must be defended. To do this, the information that is being prodded by intrusion detection systems (IDS) must be gathered and then divided into its component parts such that the activity of individual attackers is made clear. Our approach to this involves the application of Bayesian methods to data being gathered from distributed IDS. With this we hope to improve the capabilities for early detection of distributed attacks against infrastructure and the detection of the preliminary phases of distributed denial of service attacks.
引用
收藏
页码:329 / 334
页数:6
相关论文
共 11 条
[1]  
ALBEROLA C, 1999, IEEE INTELL SYST APP, P70
[2]  
[Anonymous], BAYESIAN MULTIPLE TA
[3]   DISTRIBUTED BAYESIAN HYPOTHESIS-TESTING WITH DISTRIBUTED DATA FUSION [J].
CHAIR, Z ;
VARSHNEY, PK .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1988, 18 (05) :695-699
[4]  
DAIN OM, 2001, P 8 ACM C COMP COMM
[5]  
*INT ENG TASK FORC, 1999, INTR DET EXCH FORM R
[6]  
KAHN C, 2000, UNPUB J COMPUTER SEC
[7]  
LEE W, 2000, RAID 2000
[8]  
RANUM MJ, 2000, INTRUSION DETECTION
[9]  
*SANS I, 2001, INC ORG
[10]  
*SRI, 2001, EM INTR DET SYST HOM