DocumentCode :
3178832
Title :
Towards the scalable implementation of a user level anomaly detection system
Author :
Chinchani, Ramkumar ; Upadhyaya, Shambhu ; Kwiat, Kevin
Author_Institution :
Dept. of Comput. Sci. & Eng., State Univ. of New York, Buffalo, NY, USA
Volume :
2
fYear :
2002
fDate :
7-10 Oct. 2002
Firstpage :
1503
Abstract :
Traditional intrusion detection systems can be broadly classified as misuse and anomaly detectors. Misuse detectors attempt detection by matching the current system/user activity against known signatures and patterns. As opposed to this, anomaly detection works by developing a reference graph and comparing the ongoing activity against it. Any significant deviation is flagged as an intrusion. Anomaly detection is more promising because of its potential to detect unseen types of attacks. However, both techniques have conventionally relied on audit trails sampled deep inside the system via probes and the sheer size of the data allows only after-the-fact and off line detection. In recent past, there have been efforts to capture the semantics of system activity for more rapid detection and this can typically be done at levels closer to the user. In our earlier works related to this effort, we presented a scheme and a reasoning framework to detect intrusions based on the encapsulated user intent. This paper addresses the scalability and implementation aspects of the system by introducing concepts such as workspaces and meta-operations. Although this security system is a general anomaly detection system, it is amenable to operator fault recovery. While encryption provides secure communication channels, it leaves the end points exposed. Our security system has the additional capability of handling insider attacks relevant in this context.
Keywords :
computer network management; graphs; military communication; military computing; telecommunication security; encapsulated user intent; exposed end points; insider attacks; meta-operations; operator fault recovery; reasoning framework; reference graph; scalable implementation; user level anomaly detection system; workspaces; Communication channels; Communication system security; Context; Cryptography; Detectors; Fault detection; Intrusion detection; Pattern matching; Probes; Scalability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
MILCOM 2002. Proceedings
Print_ISBN :
0-7803-7625-0
Type :
conf
DOI :
10.1109/MILCOM.2002.1179706
Filename :
1179706
Link To Document :
بازگشت