2009
DOI: 10.1007/978-3-642-04342-0_4
|View full text |Cite
|
Sign up to set email alerts
|

Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems

Abstract: Abstract. Our work proposes a generic architecture for runtime monitoring and optimization of IDS based on the challenge insertion. The challenges, known instances of malicious or legitimate behavior, are inserted into the network traffic represented by NetFlow records, processed with the current traffic and the system's response to the challenges is used to determine its effectiveness and to fine-tune its parameters. The insertion of challenges is based on the threat models expressed as attack trees with atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
11
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 23 publications
1
11
0
Order By: Relevance
“…The most commonly used model for attack trees is based on propositional logic, cf. [4,16]. Here, we propose an extension of this model to attack-defense trees.…”
Section: Models For Attack-defense Termsmentioning
confidence: 95%
See 1 more Smart Citation
“…The most commonly used model for attack trees is based on propositional logic, cf. [4,16]. Here, we propose an extension of this model to attack-defense trees.…”
Section: Models For Attack-defense Termsmentioning
confidence: 95%
“…Several different approaches, like propositional logics or multiset interpretations, were proposed in the literature to define semantics for attack trees [4,16,3]. In this section, we extend them to attack-defense trees.…”
Section: Models For Attack-defense Termsmentioning
confidence: 98%
“…Cretu et al [35] proposed a method that tries to allow the detection sensor to adapt to behaviors of the protected host during the training phase. Rehák et al [36] developed a framework for online monitoring and optimization of IDS based on the insertion of network traffic. Rassam et al [37] proposed two anomaly detection models, namely, Principal Component Classifier-based Anomaly Detection (PCCAD) and adaptive PCCAD for static and dynamic environments.…”
Section: Adaptive and Online Anomaly Intrusion Detectionmentioning
confidence: 99%
“…scanning and DDoS attacks) was observed to be the main reason for short, unidirectional one-way flows on both campus and backbone links [28]. Rehák et al [29] uses NetFlow data to fine-tune an Intrusion Detection System (IDS) by periodical insertion of challenges (or fault injections).…”
Section: Related Workmentioning
confidence: 99%