2000
DOI: 10.1007/3-540-39945-3_6
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive, Model-Based Monitoring for Cyber Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
123
0
3

Year Published

2003
2003
2012
2012

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 217 publications
(126 citation statements)
references
References 2 publications
0
123
0
3
Order By: Relevance
“…Finally, we should note that our approach has some similarity with statistical approaches to intrusion detection based on Bayesian networks (e.g. [27]). The difference from these approaches is that we use Dempster Shafer beliefs to provide measures of the genuineness of individual events and the likelihood of potential rule violations due to some inherent uncertainty about the occurrence or not of specific events which arises by communication delays between event sources and the reasoning system that performs the threat analysis.…”
Section: Related Workmentioning
confidence: 94%
See 1 more Smart Citation
“…Finally, we should note that our approach has some similarity with statistical approaches to intrusion detection based on Bayesian networks (e.g. [27]). The difference from these approaches is that we use Dempster Shafer beliefs to provide measures of the genuineness of individual events and the likelihood of potential rule violations due to some inherent uncertainty about the occurrence or not of specific events which arises by communication delays between event sources and the reasoning system that performs the threat analysis.…”
Section: Related Workmentioning
confidence: 94%
“…Intrusions are, thus, detected as deviations from the expected normal behaviour of the system. Misuse-based approaches [7,11,27], on the other hand, are based on models of known attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The basic idea is that when an interesting event (e.g., new Modbus unit ID detected or a change in the status of a Modbus service) is observed for the first time, a report is generated for the state transition. To this end, we have implemented two intrusion detection sensors, namely, EMERALD Bayes sensor [12] and EModbus. The former contains a TCP-level service discovery component, which learns active services on a monitored network, and as these are discovered it maintains a Bayes instance that rapidly detects when the service is down.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…• Bayesian protocol anomaly detection engine [12] • Snort, with a ruleset configured to complement the other components of the EMERALD sensor suite enhanced with the PCS ruleset from Digital Bond (www.digitalbond.com)…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…This would not be an effective defense against novel attacks or fast spreading worms. Network anomaly detection systems such as ADAM [2], SPADE [3], and eBayes [11], use machine learning approaches to model normal network traffic in order to identify unusual events as suspicious, but they model low-level (firewall-like) features such as addresses and port numbers, rather than application protocols.…”
Section: Introduction and Related Workmentioning
confidence: 99%