DocumentCode :
2855436
Title :
Operator-Centric and Adaptive Intrusion Detection
Author :
Larson, Ulf E. ; Lindskog, Stefan ; Nilsson, Dennis K. ; Jonsson, Erland
Author_Institution :
Dept. of Comput. Sci. & Eng., Chalmers Univ. of Technol., Goteborg
fYear :
2008
fDate :
8-10 Sept. 2008
Firstpage :
161
Lastpage :
166
Abstract :
An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It should also support dynamic selection and de-selection of detection algorithms, and it should adjust its resource consumption to the current need. Such a system would allow the operator to easily extend the system when new detection algorithms become available. It would also allow the operator to maintain a low-cost monitoring baseline and perform more extensive monitoring when it is required. In this paper we propose an architecture for intrusion detection which aims at providing the operator with this support. The architecture uses a modular design to promote a high degree of flexibility. This supports creation of an environment in which state-of-the-art intrusion detection algorithms easily can be inserted. The modular design also allows for detection algorithms to be enabled and disabled when required. Additionally, the architecture uses a sensor reconfiguration mechanism to affect the amount of data collected. When a detection algorithm is enabled or disabled, the sensor providing the input data to the algorithm is correspondingly reconfigured. This implies a minimum of excess collected data. To illustrate the feasibility of the architecture, we provide a proof - of-concept supporting monitoring of users for insider detection and webserver monitoring for intrusion attempts.
Keywords :
security of data; adaptive intrusion detection; insider detection; low-cost monitoring baseline; modular design; operator-centric intrusion detection; sensor reconfiguration mechanism; webserver monitoring; Algorithm design and analysis; Communication system security; Computer science; Computer security; Detection algorithms; Information security; Intrusion detection; Monitoring; Quality of service; Sensor systems; adaption; intrusion detection; operator-centric; sensor reconfiguration; system architecture;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference on
Conference_Location :
Naples
Print_ISBN :
978-0-7695-3324-7
Type :
conf
DOI :
10.1109/IAS.2008.42
Filename :
4627079
Link To Document :
بازگشت