Browse > Article

Agent Intrusion Detection Model In Attributed Environment  

Jeong, Jong-Geun (Computer Engineering Department, University of Honam)
Kim, Chul-Won (Computer Engineering Department, University of Honam)
Abstract
Firewall is not perfectly prevent hacker, Intrusion Detection System(IDS) is considered a next generation security solution for more trusted network i and system security. We propose a agent IDS model in the different platforms that can detect intrusions in the expanded distributed host environment, since that is a drawback of existing IDS. Then we implement a prototype and verify validity. We use a pattern extraction agent so that we extract audit files needed in intrusion detection automatically even in other platforms.
Keywords
Agent; IDS; Auditdata; Attribute;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Lee, R. Nimbalkar, K. Yee, S.Patil, P. Desai, T. Tran, and S. J. Stolfo. 'A data mining and CIDF based approach for detecting novel and distributed intrusions'. In Proceedings of the 3rd International Workshop on Recent Advances in intrusion Detection, October 2000
2 W.Lee, S.J.Stolfo, and K.Mok, 'A Data Mining Framework for Building Intrusion Detection models', 1999 IEEE Symposium on security and Privacy, 1999
3 T. lane and C. E. Brodley. 'Detecting abnormal : Machine leaming in computer security', Technical Report TRECE 97-1, Prudue University, West Lafayette, IN, 1997
4 Jai Sundar B. Spafford E, 'Software Agents for Intrusion Detection,' Technical Report, Purdue University, Department of Computer Science, 1997
5 Wenke Lee, Salvatore J.Stolfo, Philip k.Chan, 'Real Time Data Mining-based Intrusion Detection'. In proceedings of IEEE symposium on research in security and privacy, 2000
6 T. Lane and C. E. Brodley. 'Temporal sequence leaming and data reduction dor anomaly detection'. In Processsing of the fifth ACM Conference on Computer and Communications Security, pages 150-158, 1998
7 W. Lee, S. J. Stolfo. 'Data mining approaches for intrusion detection'. In Proceeding of the 1998 USENIX security Symposium, 1998
8 Sandeep Kumar, gene Spafford. 'A Pattern Matching Model for Misuse Intrusion Detection,' Proceedings of the 17th National Computer Security Conference, October 1994
9 Crosbie M, Spafford E, 'Defending a Computer System using Autonomous Agents,' Technical Report, Purdue University, Department of Computer Science, 1996