{"title":"一种混合入侵检测和可视化系统","authors":"Jianfeng Peng, Chuan Feng, J. Rozenblit","doi":"10.1109/ECBS.2006.8","DOIUrl":null,"url":null,"abstract":"Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large proportion of these networks. Unauthorized accesses and misuse of critical data can be catastrophic to businesses, emergency services, and even threaten the defense and security of a nation. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. This paper proposes a hybrid intrusion detection and visualization system that leverages the advantages of current signature-based and anomaly detection methods. The hybrid instruction detection system deploys these two methods in a two-staged manner to identify both known and novel attacks. When intrusion is detected, autonomous agents that reside on the system automatically take actions against misuse and abuse of computer system, thus protecting the system from internal and external attacks","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"A hybrid intrusion detection and visualization system\",\"authors\":\"Jianfeng Peng, Chuan Feng, J. Rozenblit\",\"doi\":\"10.1109/ECBS.2006.8\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large proportion of these networks. Unauthorized accesses and misuse of critical data can be catastrophic to businesses, emergency services, and even threaten the defense and security of a nation. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. This paper proposes a hybrid intrusion detection and visualization system that leverages the advantages of current signature-based and anomaly detection methods. The hybrid instruction detection system deploys these two methods in a two-staged manner to identify both known and novel attacks. When intrusion is detected, autonomous agents that reside on the system automatically take actions against misuse and abuse of computer system, thus protecting the system from internal and external attacks\",\"PeriodicalId\":430872,\"journal\":{\"name\":\"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-03-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECBS.2006.8\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECBS.2006.8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A hybrid intrusion detection and visualization system
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large proportion of these networks. Unauthorized accesses and misuse of critical data can be catastrophic to businesses, emergency services, and even threaten the defense and security of a nation. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. This paper proposes a hybrid intrusion detection and visualization system that leverages the advantages of current signature-based and anomaly detection methods. The hybrid instruction detection system deploys these two methods in a two-staged manner to identify both known and novel attacks. When intrusion is detected, autonomous agents that reside on the system automatically take actions against misuse and abuse of computer system, thus protecting the system from internal and external attacks