{"title":"入侵检测系统中的图形技术","authors":"Boaz Gelbord","doi":"10.1109/ICOIN.2001.905436","DOIUrl":null,"url":null,"abstract":"As coordinated attacks on networks become more frequent, the study of systems that can identify unlawful attempts to penetrate a network, or so called intrusion detection systems (IDS), has become increasingly popular. IDS traditionally suffer from an inability to detect an attack that is built from a sequence of valid network activity. For this reason it is important to develop a system capable of analyzing the global nature of the network activity. One such system is GrIDS-a graph based intrusion detection system for large networks, being developed at the University of California, Davis, California. This system constructs graphs based on the network activity and then detects attacks based on an analysis of the characteristics of these graphs. One of the bottlenecks in this process is the inability to efficiently compare characteristics of very large networks. This often becomes necessary because the increasing complex nature of network traffic generates graphs with multiple nodes and edges. We propose using a new result on subgraph isomorphism due to Eppstein (see Journal of Graph Algorithms and Applications, vol.3, no.3, p.1-27, 1999) to maximize the efficiency of this analysis. This provides the IDS with the ability to analyze traffic on a broader level and thus increases the overall performance of the system.","PeriodicalId":332734,"journal":{"name":"Proceedings 15th International Conference on Information Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Graphical techniques in intrusion detection systems\",\"authors\":\"Boaz Gelbord\",\"doi\":\"10.1109/ICOIN.2001.905436\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As coordinated attacks on networks become more frequent, the study of systems that can identify unlawful attempts to penetrate a network, or so called intrusion detection systems (IDS), has become increasingly popular. IDS traditionally suffer from an inability to detect an attack that is built from a sequence of valid network activity. For this reason it is important to develop a system capable of analyzing the global nature of the network activity. One such system is GrIDS-a graph based intrusion detection system for large networks, being developed at the University of California, Davis, California. This system constructs graphs based on the network activity and then detects attacks based on an analysis of the characteristics of these graphs. One of the bottlenecks in this process is the inability to efficiently compare characteristics of very large networks. This often becomes necessary because the increasing complex nature of network traffic generates graphs with multiple nodes and edges. We propose using a new result on subgraph isomorphism due to Eppstein (see Journal of Graph Algorithms and Applications, vol.3, no.3, p.1-27, 1999) to maximize the efficiency of this analysis. This provides the IDS with the ability to analyze traffic on a broader level and thus increases the overall performance of the system.\",\"PeriodicalId\":332734,\"journal\":{\"name\":\"Proceedings 15th International Conference on Information Networking\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2001-01-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 15th International Conference on Information Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOIN.2001.905436\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 15th International Conference on Information Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN.2001.905436","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
摘要
随着对网络的协同攻击变得越来越频繁,对能够识别非法渗透网络企图的系统(即所谓的入侵检测系统(IDS))的研究变得越来越流行。传统上,IDS无法检测由一系列有效网络活动构建的攻击。因此,开发一个能够分析网络活动的全局性质的系统是很重要的。一个这样的系统是grids——一个基于图的大型网络入侵检测系统,由加州大学戴维斯分校开发。该系统基于网络活动构造图形,然后通过分析这些图形的特征来检测攻击。这个过程中的瓶颈之一是无法有效地比较非常大的网络的特征。这通常是必要的,因为日益复杂的网络流量会生成具有多个节点和边的图。我们提出了一个关于子图同构的新结果,这是由于Eppstein(见Journal of Graph Algorithms and Applications, vol.3, no. 5)。3, p.1-27, 1999),以最大限度地提高这种分析的效率。这为IDS提供了在更广泛的级别上分析流量的能力,从而提高了系统的整体性能。
Graphical techniques in intrusion detection systems
As coordinated attacks on networks become more frequent, the study of systems that can identify unlawful attempts to penetrate a network, or so called intrusion detection systems (IDS), has become increasingly popular. IDS traditionally suffer from an inability to detect an attack that is built from a sequence of valid network activity. For this reason it is important to develop a system capable of analyzing the global nature of the network activity. One such system is GrIDS-a graph based intrusion detection system for large networks, being developed at the University of California, Davis, California. This system constructs graphs based on the network activity and then detects attacks based on an analysis of the characteristics of these graphs. One of the bottlenecks in this process is the inability to efficiently compare characteristics of very large networks. This often becomes necessary because the increasing complex nature of network traffic generates graphs with multiple nodes and edges. We propose using a new result on subgraph isomorphism due to Eppstein (see Journal of Graph Algorithms and Applications, vol.3, no.3, p.1-27, 1999) to maximize the efficiency of this analysis. This provides the IDS with the ability to analyze traffic on a broader level and thus increases the overall performance of the system.