Agent Intrusion Detection Model In Attributed Environment

  • Published : 2004.06.01

Abstract

Firewall is not perfectly prevent hacker, Intrusion Detection System(IDS) is considered a next generation security solution for more trusted network i and system security. We propose a agent IDS model in the different platforms that can detect intrusions in the expanded distributed host environment, since that is a drawback of existing IDS. Then we implement a prototype and verify validity. We use a pattern extraction agent so that we extract audit files needed in intrusion detection automatically even in other platforms.

Keywords

References

  1. T. Lane and C. E. Brodley. 'Temporal sequence leaming and data reduction dor anomaly detection'. In Processsing of the fifth ACM Conference on Computer and Communications Security, pages 150-158, 1998
  2. W. Lee, R. Nimbalkar, K. Yee, S.Patil, P. Desai, T. Tran, and S. J. Stolfo. 'A data mining and CIDF based approach for detecting novel and distributed intrusions'. In Proceedings of the 3rd International Workshop on Recent Advances in intrusion Detection, October 2000
  3. W. Lee, S. J. Stolfo. 'Data mining approaches for intrusion detection'. In Proceeding of the 1998 USENIX security Symposium, 1998
  4. W.Lee, S.J.Stolfo, and K.Mok, 'A Data Mining Framework for Building Intrusion Detection models', 1999 IEEE Symposium on security and Privacy, 1999
  5. Sandeep Kumar, gene Spafford. 'A Pattern Matching Model for Misuse Intrusion Detection,' Proceedings of the 17th National Computer Security Conference, October 1994
  6. T. lane and C. E. Brodley. 'Detecting abnormal : Machine leaming in computer security', Technical Report TRECE 97-1, Prudue University, West Lafayette, IN, 1997
  7. Jai Sundar B. Spafford E, 'Software Agents for Intrusion Detection,' Technical Report, Purdue University, Department of Computer Science, 1997
  8. Crosbie M, Spafford E, 'Defending a Computer System using Autonomous Agents,' Technical Report, Purdue University, Department of Computer Science, 1996
  9. Wenke Lee, Salvatore J.Stolfo, Philip k.Chan, 'Real Time Data Mining-based Intrusion Detection'. In proceedings of IEEE symposium on research in security and privacy, 2000