Implementation of Distributed Intrusion Detection System based on Protocols

프로토콜 기반 분산 침입탐지시스템 설계 및 구현

  • 양환석 (중부대학교 정보보호학과)
  • Published : 2012.03.30

Abstract

Intrusion Detection System that protects system safely is necessary as network technology is developed rapidly and application division is wide. Intrusion Detection System among others can construct system without participation of other severs. But it has weakness that big load in system happens and it has low efficient because every traffics are inspected in case that mass traffic happen. In this study, Distributed Intrusion Detection System based on protocol is proposed to reduce traffic of intrusion detection system and provide stabilized intrusion detection technique even though mass traffic happen. It also copes to attack actively by providing automatic update of using rules to detect intrusion in sub Intrusion Detection System.

Keywords

References

  1. D. J. Marchette, Computer Intrusion Detection and Network Monitoring, Springer, New York, 2001.
  2. 최윤정, "침입탐지시스템의 정확도 향상을 위한 개선된 데이터마이닝 방법론," 디지털정보산업학회지, 제6권, 제1호, 2010, pp. 1-12.
  3. Alfonso Valdes, "Detecting novel scans through pattern anomaly detection," DARPA Information Survivability Conference and Exposition, 2003.
  4. Yu Liu, Yang Li and Hong Man, "Mac Layer Anonaly Detection in Ad Hoc Networks," Proceedings of the 6th IEEE Information Assurance Workshop, June 17, 2005, pp. 402-409.
  5. Yia-an Huang, Wenke Lee, "A Cooperative Intrusion Detection System for Ad hoc Networks," Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, 2003, pp. 135-147.
  6. Shi Zhong, Taghi M. Khoshgoftaar, and Naeem Seluya, "Evaluating Clustering Techniques for Network Intrusion Detection," In Proceeding of the 10th ISSAT International Conference on Reliability and Quality and Design, 2004, pp. 149-155.
  7. 노시춘, "네트워크보안 인프라의 차단구조 설계 방법," 디지털산업정보학회지, 제2권, 제2호, 2006, pp. 9-20.
  8. R. Hixon, D. M. Gruenbacher, "Markov Chains in Network Intrusion Detection," Proceedings of the IEEE Workshop on Information Assurance, United States Military Academy, 2004, pp. 432-433.