2014 6th International Conference on Cyber Conflict (CyCon 2014) 2014
DOI: 10.1109/cycon.2014.6916403
|View full text |Cite
|
Sign up to set email alerts
|

Towards multi-layered intrusion detection in high-speed networks

Abstract: Traditional Intrusion Detection approaches rely on the inspection of individual packets, often referred to as Deep Packet Inspection (DPI), where individual packets are scanned for suspicious patterns. However, the rapid increase of link speeds and throughputsespecially in larger networks such as backbone networks -seriously constrains this approach. First, devices capable of detecting intrusions on high-speed links of 10 Gbps and higher are rather expensive, or must be built based on complex arrays. Second, l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…The primary focus of this work are multiple high-speed networks using a link speed of 10 Gbps and higher [17]. In addition, we focus on network operators that cooperate among trusted partners to minimize or prevent damages caused by network-based attacks and use an automated threat information exchange.…”
Section: Scenariomentioning
confidence: 99%
“…The primary focus of this work are multiple high-speed networks using a link speed of 10 Gbps and higher [17]. In addition, we focus on network operators that cooperate among trusted partners to minimize or prevent damages caused by network-based attacks and use an automated threat information exchange.…”
Section: Scenariomentioning
confidence: 99%
“…However, modifying parameters to fit defined security policies is not an obvious task. Golling et al [11] propose multi-layered detection system. This system uses a manager that communicates with different types of IDS/IPS: flow-based, protocol-based, statistical based and DPI based ones.…”
Section: Detection and Response Solutionsmentioning
confidence: 99%
“…Flow-based intrusion detection systems have several advantages over payload and protocol-based techniques (Golling et al, 2014). Flow-based approaches only inspect the packet headers and do not consume any resources in the analysis of packet payloads.…”
Section: Introductionmentioning
confidence: 99%
“…Also, the flow export and collection process involve a certain delay in intrusion detection during which slow and small ramped attacks can go undetected (Vykopal et al, 2013). Golling et al, 2014) have given a comparison of flow-based intrusion detection technique with other approaches.…”
Section: Introductionmentioning
confidence: 99%