Information Technology Reference
In-Depth Information
operation by the parameter settings of SMTP transactions according to the
current status of network.
5 Conclusion
In this paper, we have proposed an intrusion detection system with two-stage
orthogonal method to address the conventional tradeoffs between clustering for
AID and classification for MID. The advantages pointed out in our discussion
are as follows:
- Adjustment function of classification using double-layer signature matrix
offers the ability to keep the rate of AID false positive reasonably low while
detecting numerous unlabeled attacks.
- The reduction of false positive of AID enables the output of detectors to be
applied for switching condition between parameter reconfiguring and protec-
tive data modification of proxy.
- In the unseen attacks our model detects, the forwarding delay time set in
the proxy server synchronized to the detection intervals makes it possible
to recover the system faster and prevent effectively the malicious code from
spreading.
It is expected that the adaptive coordination and automated updating profiles
is useful to reduce the burden of current security administration.
References
1. Martina Thottan, Chuanyi Ji.: Proactive Anomaly Detection Using Distributed
Intelligent Agents. IEEE Network Special Issue on Network Management, vol.
12(1998) 21-27
2. Ghosh, Anup, K. Wanken, James and Charron, Frank.: Detecting Anomalous and
Unknown Intrusions Against Programs. Proceedings of the 14th IEEE Annual
Computer Security Applications Conference (1998) 259-267
3. Ulf Lindqvist and Erland Jonsson.: How to Systematically Classify Computer Se-
curity Intrusions. Proceedings of the 1997 IEEE Symposium on Security & Privacy
(1997) 154-163
4. James Cannady.: Artificial Neural Networks for Misuse Detection. Proceedings of
the 1998 National Information Systems Security Conference (NISSC'98)
5. Shieh, S.W., Virgil D. Gligor.: A Pattern-Oriented Intrusion-Detection Model and
Its Applications. IEEE Symposium on Security and Privacy (1991) 327-342
Baldonado, M., Chang, C.-C.K., Gravano, L., Paepcke, A.: The Stanford Digital
Library Metadata Architecture. Int. J. Digit. Libr. 1 (1997) 108-121
6. Pao, Y.H., and Takefuji, Y.: Functional-link net computing: theory, system archi-
tecture and functionalities. IEEE Computer (1992) 76-79
 
Search WWH ::




Custom Search