DOI QR코드

DOI QR Code

Design and Analysis of Multiple Intrusion Detection Model

다중 침입 탐지 모델의 설계와 분석

  • Lee, Yo-Seob (Dept. of Computer Science, Pyeongtaek University)
  • Received : 2016.05.17
  • Accepted : 2016.06.24
  • Published : 2016.06.30

Abstract

Intrusion detection model detects a intrusion when intrusion behaviour occurred. The model analyzes a variety of intrusion pattern and supports a modeling method to represent for a intrusion pattern efficiently. Particularly, the model defines classes of intrusion pattern and supports modeling method that detects a network level intrusion through multiple hosts for multiple intrusions. In this paper, proposes a multiple intrusion detection model that support a verification method for intrusion detection systems and verifies a safeness of proposed model and compares with other models.

침입 탐지 모델은 침입 행위가 발생할 때 침입을 탐지하기 위해 사용하는 모델로서 침입 패턴을 잘 표현하기 위해서는 먼저 침입 패턴의 유형에 대해 분석하고 각 유형별로 침입 패턴에 대한 표현 방법을 제공할 수 있어야 한다. 특히 하나의 호스트 레벨의 침입뿐만 아니라 다중 호스트를 이용한 네트워크 레벨의 침입을 탐지하기 위해서는 이러한 다중 침입의 유형을 정의하고 다중 침입에 대한 표현 방법을 제공해야 한다. 본 논문에서는 침입 탐지 시스템의 안전성에 대한 검증 방법을 제공하는 다중 침입 탐지 모델을 제안하고 제안한 모델의 안전성을 검증하며 다른 모델들과 비교 평가한다.

Keywords

References

  1. S. Sonawane, "A survey on intrusion detection techniques," World J. of Science and Technology, vol. 2, no. 3, 2012, pp. 127-133.
  2. Y. Chun, "Hacking Detection Mechanism of Cyber Attacks Modeling," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 9, 2013, pp. 1313-1318. https://doi.org/10.13067/JKIECS.2013.8.9.1313
  3. Y. Kim, "IDS Performance on MANET with Packet Aggregation Transmissions," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 6, 2014, pp. 695-701. https://doi.org/10.13067/JKIECS.2014.9.6.695
  4. S. Park, "Current Status and Analysis of Domestic Security Monitoring Systems," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, 2014, pp. 261-266. https://doi.org/10.13067/JKIECS.2014.9.2.261
  5. D. Denning, "An Intrusion Detection Model," IEEE Trans. Software Engineering, vol. 13, no. 2, Feb. 1987, pp. 222-232.
  6. B. Jasiul, "Detection and Modeling of Cyber Attacks with Petri Nets," Entropy, vol. 16, no. 12, 2014, pp. 6602-6623. https://doi.org/10.3390/e16126602
  7. K. Jensen and L. Kristensen, "Colored Petri Nets - Modeling and Validation of Concurrent Systems," Springer-Verlag Berlin, 2009.
  8. S. Shieh and D. Gligor, "On a Pattern-Oriented Model for Intrusion Detection," IEEE Trans. Knowledge and Data Engineering, vol. 9, no. 4, Aug. 1997, pp. 661-667. https://doi.org/10.1109/69.617059
  9. S. Kumar, "Classification and Detection of Computer Intrusions," Ph.D's Thesis, Purdue University, Aug. 1995.