Title :
Analysis of distributed intrusion detection systems using Bayesian methods
Author :
Burroughs, Daniel J. ; Wilson, Linda F. ; Cybenko, George V.
Author_Institution :
Thayer Sch. of Eng., Dartmouth Coll., Hanover, NH, USA
Abstract :
In computer and network security, standard approaches to intrusion detection and response attempt to detect and prevent individual attacks. However, it is not the attack but rather the attacker against which our networks must be defended. To do this, the information that is being provided by intrusion detection systems (IDS) must be gathered and then divided into its component parts such that the activity of individual attackers is made clear. Our approach to this involves the application of Bayesian methods to data being gathered from distributed IDS. With this we hope to improve the capabilities for early detection of distributed attacks against infrastructure and the detection of the preliminary phases of distributed denial of service attacks
Keywords :
Bayes methods; Internet; authorisation; security of data; telecommunication security; Bayesian methods; IDS; computer security; data gathering; denial of service attacks; distributed attacks; distributed intrusion detection systems; network security; Bayesian methods; Computer networks; Computer security; Educational institutions; Intrusion detection; Phase detection; Scattering; Sensor fusion; Target tracking; Telecommunication traffic;
Conference_Titel :
Performance, Computing, and Communications Conference, 2002. 21st IEEE International
Conference_Location :
Phoenix, AZ
Print_ISBN :
0-7803-7371-5
DOI :
10.1109/IPCCC.2002.995166