Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Abstraction-based intrusion detection in distributed environments
Ning P. (ed), Jajodia S., Wang X. ACM Transactions on Information and System Security4 (4):407-452,2001.Type:Article
Date Reviewed: Jun 24 2002

A new model for creating distributed intrusion detection systems is presented in this paper. The model uses three concepts: system views, signatures, and view definitions. The system view provides an abstract representation of a specific kind of information about events, and of the relationships among components of a system. The signature is a representation of a distributed event pattern, on an instantiation of a system view. The view definition derives useful information from signatures presented through a system view (an extension of earlier work).

The authors’ model uses abstraction to hide heterogeneity and irrelevant details. It also uses hierarchical concepts to embody distributed attack and event abstraction. The signatures represent known misuse attacks, and not anomalies. The goal is to analyze events locally, that is, in a distributed manner, and to build a hierarchy of views and signatures that result in the identification of a known misuse pattern.

This paper describes a research effort to build intrusion detection systems that can be effectively deployed in large networks. The authors indicate that abstraction, hierarchical modeling based on local analysis, and the use of view definitions make their model unique. They have built a small system as proof of concept for signature decomposition, and for the distribution and execution of detection tasks. Hopefully, their next paper will reveal whether or not this model works in the real world.

Reviewer:  Anthony Donald Vanker Review #: CR126201 (0208-0449)
Bookmark and Share
 
Invasive Software (D.4.6 ... )
 
 
Distributed Systems (D.4.7 ... )
 
 
Organization And Design (D.4.7 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Invasive Software": Date
A novel computer architecture to prevent destruction by viruses: volume management and system tuning
Qingshi G., Yue H., Lei L., Xu C., Honglan L. Journal of Computer Science and Technology 17(3): 241-248, 2002. Type: Article
Jun 25 2003
Defense and detection strategies against Internet worms
Nazario J., Artech House, Inc., Norwood, MA, 2003. Type: Book (9781580535373)
Sep 23 2004
Hop integrity: a defense against denial-of-service attacks (Advances in Information Security)
Huang C., Gouda M., Springer-Verlag New York, Inc., Secaucus, NJ, 2005.  112, Type: Book (9780387244266)
Sep 26 2006
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy