【24h】

Towards a Theory of Intrusion Detection

机译:迈向入侵检测理论

获取原文
获取原文并翻译 | 示例

摘要

We embark into theoretical approaches for the investigation of intrusion detection schemes. Our main motivation is to provide rigorous security requirements for intrusion detection systems that can be used by designers of such systems. Our model captures and generalizes well-known methodologies in the intrusion detection area, such as anomaly-based and signature-based intrusion detection, and formulates security requirements based on both well-known complexity-theoretic notions and well-known notions in cryptography (such as computational indistinguishability). Under our model, we present two efficient paradigms for intrusion detection systems, one based on nearest neighbor search algorithms, and one based on both the latter and clustering algorithms. Under formally specified assumptions on the representation of network traffic, we can prove that our two systems satisfy our main security requirement for an intrusion detection system. In both cases, while the potential truth of the assumption rests on heuristic properties of the representation of network traffic (which is hard to avoid due to the unpredictable nature of external attacks to a network), the proof that the systems satisfy desirable detection properties is rigorous and of probabilistic and algorithmic nature. Additionally, our framework raises open questions on intrusion detection systems that can be rigorously studied. As an example, we study the problem of arbitrarily and efficiently extending the detection window of any intrusion detection system, which allows the latter to catch attack sequences interleaved with normal traffic packet sequences. We use combinatoric tools such as time and space-efficient covering set systems to present provably correct solutions to this problem.
机译:我们采用理论方法来研究入侵检测方案。我们的主要动机是为入侵检测系统提供严格的安全要求,以供此类系统的设计人员使用。我们的模型捕获并归纳了入侵检测领域中的众所周知的方法,例如基于异常和基于签名的入侵检测,并基于众所周知的复杂性理论概念和密码学中众所周知的概念(例如作为计算上的不可区分性)。在我们的模型下,我们为入侵检测系统提供了两种有效的范例,一种基于最近邻居搜索算法,另一种基于后者和聚类算法。在关于网络流量表示形式的正式指定假设下,我们可以证明我们的两个系统满足我们对入侵检测系统的主要安全要求。在这两种情况下,虽然假设的潜在真理取决于网络流量表示的启发式属性(由于对网络的外部攻击的不可预测性,所以很难避免),但系统满足所需检测属性的证明是严格且具有概率和算法性质。此外,我们的框架提出了有关可以严格研究的入侵检测系统的公开问题。例如,我们研究了任意有效地扩展任何入侵检测系统的检测窗口的问题,这使得入侵检测系统能够捕获与正常流量数据包序列交错的攻击序列。我们使用诸如节省时间和空间的覆盖集系统之类的组合工具来提供可证明的正确解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号