期刊文献+

基于上下文验证的网络入侵检测模型 被引量:29

Network Intrusion Detection Model Based on Context Verification
在线阅读 下载PDF
导出
摘要 大量误报引发的可信问题一直是入侵检测研究领域所面对的具有挑战性的未解技术难题之一.为了提高入侵检测系统的确定性和准确性,必须对其告警信息加以区分,滤除无效攻击导致的虚警,从而自动准确地识别有效攻击.由此,提出了一种基于上下文验证的网络入侵检测模型,结合环境上下文、弱点上下文、反馈上下文和异常上下文等多种上下文信息,构建了一个以上下文为中心、多种验证技术相结合的高效、稳定、完整、易管理、可扩充的虚警处理平台,实现了告警的自动验证以及攻击行为能否成功地自动判定,从而达到滤除虚警的目的,使入侵检测系统起到真正的预警作用. Network intrusion-detection systems (NIDSs) are considered an effective second line of defense against network-based attacks directed to computer systems. Because of the increasing severity and likelihood of such attacks, the NIDSs are employed in almost all large-scale IT infrastructures. The Achille's heel of NIDSs lies in the large number of false positives. However, today's NIDSs often try to detect not only intrusions, but also successful intrusion attempts. This is because it can be difficult for an NIDS to determine the result of an intrusion attempt. A popular approach of verifying intrusion attempt results is to let an IDS be aware of the environment and configuration of the systems under attack. Based on the above idea, in order to eliminate the negative influence on IDS stability caused by non-relevant alerts, a network intrusion detection model is designed based on context verification. With the combination of environment context, weakness context, feedback context and anomaly context, our model constructs an effective, stable, integrated, and extendable non-relevant alerts processing platform which focuses on context verification and integrates multiple security techniques. It achieves the automatic validation of alarming and automatic judgments of their effectiveness to eliminate the non-relevant alerts, and thus it establishes the reliable foundation for alerts association.
出处 《计算机研究与发展》 EI CSCD 北大核心 2013年第3期498-508,共11页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60903166) 中央高校基本科研业务费专项资金项目(HIT.NSRIF.2010041)
关键词 入侵检测 上下文 虚警 误报率 上下文验证 intrusion detection context non-relevant positives false positives context verification
  • 相关文献

参考文献20

  • 1Lippmann R,Webster S, Stetson D. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection [C]//Proc of the 15th Int Symp on Recent Advances in Intrusion Detection. Berlin: Springer, 2002: 307-326.
  • 2Sommer R, Paxson V. Enhancing byte-level network intrusion detection signatures with context [C]//Proc of the 10th ACM Conf on Computer and Communications Security. New York: ACM, 2003:262-271.
  • 3Kruegel C, Robertson W. Alert verification: Determining the success of intrusion attempts [C]//Proc of the 1st Workshop on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA). Berlin: Springer, 2004, 2622-2628.
  • 4Gula R. Correlating IDS Alerts with Vulnerability Information [M]. Englewoocl Cliffs, NJ: Prentice Hall, 2003.
  • 5Desai N. IDS Correlation of VA Data and IDS Alerts [M]. EnglewooeI Cliffs, NJ: Prentice Hall, 2005.
  • 6Nessus Vulnerability Scanner [EB/OL]. 2001. [2011-01-08]. http://www. ness-us.org.
  • 7Common Vulnerabilities and Exposures [EB/OL]. 2003. [2011-01-08]. http://www. cve. mitre. org.
  • 8Almgren M, Debar H, Dacier M. A lightweight tool for detecting Web server attacks [C]//Proc of Network and Distributed Systems Security (NDSS 2000 ) Symp. San Francisco: Morgan Kawfmann, 2000:157-170.
  • 9Zhou J, Carlson A, Bishop N. Verify results of network intrusion alerts using lightweight protocol analysis [C]//Proc of the 21st Annual Computer Security Applications Conf (ACSAC). Los Alamitos, CA: IEEE Computer Society. 2005:117-126.
  • 10Vigna G, Robertson V, Kemmerer R. A stateful intrusion detection system for world-wide Web servers [C]//Proc of the 19th Annual Computer Security Applications Conf (ACSAC). Los Alamitos, CA: IEEE Computer Society, 2003:82-96.

二级参考文献25

共引文献30

同被引文献398

引证文献29

二级引证文献574

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部