A novel scaleable architecture for intrusion detection and mitigation in switched networks

E. L. Witzke, T. Tarman, S. Ghosh, G. Woodard
{"title":"A novel scaleable architecture for intrusion detection and mitigation in switched networks","authors":"E. L. Witzke, T. Tarman, S. Ghosh, G. Woodard","doi":"10.1109/MILCOM.2002.1180474","DOIUrl":null,"url":null,"abstract":"High-speed, switched networks present scalability challenges to a network intrusion detection system, both in terms of the volume of data that must be analyzed, and the extent to which sensors must be inserted into the switched network to achieve comprehensive visibility. An architecture that uses a single point for intrusion assessment would quickly become overwhelmed with incoming event data from intrusion sensors that are deployed on even a moderate number of high-speed links. This is particularly true if an earnest attack (generating many events in a short period of time) is underway. The authors propose a novel architecture that hierarchically distributes the assessment function into two assessment categories - tactical assessment, and strategic assessment. The tactical assessment function provides low-level event correlation and decision making for a small sub-network (e.g., a department LAN, an ATM switch peer group, etc.), and is capable of providing fast, real-time response when millisecond response times are required due to network attacks. The strategic assessment function, on the other hand, implements high-level event correlation, which is useful when a larger view of the network is required (e.g., for low intensity or distributed attacks). The tactical assessment engines interface to the strategic assessment engine by, filtering and summarizing low-level events, ensuring that the strategic assessment engine's workload remains manageable. This paper describes the distributed intrusion assessment architecture in more detail, presents a few application scenarios that benefit from hierarchical attack assessment, and summarizes ongoing work in developing prototype components for this architecture.","PeriodicalId":191931,"journal":{"name":"MILCOM 2002. Proceedings","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2002. Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2002.1180474","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

High-speed, switched networks present scalability challenges to a network intrusion detection system, both in terms of the volume of data that must be analyzed, and the extent to which sensors must be inserted into the switched network to achieve comprehensive visibility. An architecture that uses a single point for intrusion assessment would quickly become overwhelmed with incoming event data from intrusion sensors that are deployed on even a moderate number of high-speed links. This is particularly true if an earnest attack (generating many events in a short period of time) is underway. The authors propose a novel architecture that hierarchically distributes the assessment function into two assessment categories - tactical assessment, and strategic assessment. The tactical assessment function provides low-level event correlation and decision making for a small sub-network (e.g., a department LAN, an ATM switch peer group, etc.), and is capable of providing fast, real-time response when millisecond response times are required due to network attacks. The strategic assessment function, on the other hand, implements high-level event correlation, which is useful when a larger view of the network is required (e.g., for low intensity or distributed attacks). The tactical assessment engines interface to the strategic assessment engine by, filtering and summarizing low-level events, ensuring that the strategic assessment engine's workload remains manageable. This paper describes the distributed intrusion assessment architecture in more detail, presents a few application scenarios that benefit from hierarchical attack assessment, and summarizes ongoing work in developing prototype components for this architecture.
一种用于交换网络中入侵检测和缓解的新型可扩展架构
高速交换网络对网络入侵检测系统提出了可扩展性的挑战,无论是必须分析的数据量,还是必须将传感器插入交换网络以实现全面可见性的程度。使用单点进行入侵评估的体系结构很快就会被部署在中等数量的高速链路上的入侵传感器传入的事件数据所淹没。如果正在进行认真的攻击(在短时间内产生许多事件),这一点尤其正确。作者提出了一种新的体系结构,将评估功能分层地划分为两类评估:战术评估和战略评估。战术评估功能为小型子网(如部门局域网、ATM交换机对等组等)提供低级事件关联和决策,在网络攻击需要毫秒级响应时间时,能够提供快速、实时的响应。另一方面,战略评估功能实现了高层次的事件关联,这在需要更大的网络视图(例如,低强度或分布式攻击)时非常有用。战术评估引擎通过过滤和汇总低级事件与战略评估引擎连接,确保战略评估引擎的工作负载仍然是可管理的。本文更详细地描述了分布式入侵评估体系结构,给出了一些受益于分层攻击评估的应用场景,并总结了该体系结构原型组件的开发工作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信