首页> 外文会议>Recent advances in intrusion detection >Determining Placement of Intrusion Detectorsfor a Distributed Application through Bayesian Network Modeling
【24h】

Determining Placement of Intrusion Detectorsfor a Distributed Application through Bayesian Network Modeling

机译:通过贝叶斯网络建模确定分布式应用程序的入侵检测器的位置

获取原文
获取原文并翻译 | 示例

摘要

To secure today's computer systems, it is critical to have different intrusion detection sensors embedded in them. The complexity of distributed computer systems makes it difficult to determine the appropriate configuration of these detectors, i.e., their choice and placement. In this paper, we describe a method to evaluate the effect of the detector configuration on the accuracy and precision of determining security goals in the system. For this, we develop a Bayesian network model for the distributed system, from an attack graph representation of multi-stage attacks in the system. We use Bayesian inference to solve the problem of determining the likelihood that an attack goal has been achieved, given a certain set of detector alerts. We quantify the overall detection performance in the system for different detector settings, namely, choice and placement of the detectors, their quality, and levels of uncertainty of adversarial behavior. These observations lead us to a greedy algorithm for determining the optimal detector settings in a large-scale distributed system. We present the results of experiments on Bayesian networks representing two real distributed systems and real attacks on them.
机译:为了保护当今的计算机系统,至关重要的是要在其中嵌入不同的入侵检测传感器。分布式计算机系统的复杂性使得难以确定这些检测器的适当配置,即它们的选择和放置。在本文中,我们描述了一种评估检测器配置对确定系统中安全目标的准确性和精度的影响的方法。为此,我们从系统中多阶段攻击的攻击图表示中为分布式系统开发了贝叶斯网络模型。我们使用贝叶斯推理来解决给定一组检测器警报的情况下确定达到攻击目标的可能性的问题。我们对不同检测器设置(即检测器的选择和放置,它们的质量以及对抗行为的不确定性水平)对系统中的整体检测性能进行量化。这些观察结果使我们想到了一种贪婪算法,用于确定大型分布式系统中的最佳检测器设置。我们介绍了代表两个实际分布式系统和对其的实际攻击的贝叶斯网络上的实验结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号