Skip to main content

Design of Network Security Control System for Cooperative Intrusion Detection

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2344))

Abstract

As intrusions and other attacks become more widespread and more sophisticated, it becomes more difficult to detect them at a single intrusion detection system(IDS). Therefore, IDSs have become focused on various intrusions (and/or attacks) in large scale network environments. But, it is not easy to detect various intrusions, since the design of early IDSs are based on analyzing the audit trails supported just a single host. Here we have made effort to design and implement IDS which can detect more complex attacks as well as support security management through cooperating each others. In this paper, we present the architecture of our system that detects various intrusions in large scale network environments as well as supports flexibility, portability, and extensibility for policy based security management.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Byoung Koo Kim, D.S. Kim, and Tai M. Chung, “A Design of Integrated Intrusion Detection Systems in a Large Scale Network Environment”, APNOMS 2000, pp. 187–197, Nara, Japan, Oct., 2000.

    Google Scholar 

  2. D. E. Denning, “An Intrusion-Detection Model”, In Proceedings of the IEEE Symposium on Security and Privacy, pp. 118–131, 1986.

    Google Scholar 

  3. D. Anderson, T. Frivold and A. Valdes, “Next-gene ration intrusion detection expert system (NIDES)”, Technical Report SRI-CLS-95-07, May, 1995.

    Google Scholar 

  4. S. Kumar, “Classification and Detection of Com puter Intrusions”, Phd, Purdue University, 1995.

    Google Scholar 

  5. S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip and D. Zerkle, “GrIDS-A Graph based intrusion detection system for large networks”, In Proceedings of the 19th National Information Systems Security Conference, 1996.

    Google Scholar 

  6. P. A. Porras and P. G. Neumann, “EMERALD: Event monitoring enabling responses to anomalous live disturbances”, In National Information Systems Security Conference, pp. 353–365, Baltimore, MD, Oct., 1997.

    Google Scholar 

  7. J. S. Balasubramaniyan, J. O. Garcia Fernandez, D. Isacoff, E. Spafford and D. Zamboni, “An Architecture for Intrusion Detection using Autonomous Agents”, COAST Technical Report 98/05, Jun., 1998.

    Google Scholar 

  8. C. Kahn, P. A. Porras, S. Staniford-Chen and B. Tung, “A Common Intrusion Detection Framework-data formats”, Internet draft-ietf-cidf-data-formats-00.txt, Mar., 1998.

    Google Scholar 

  9. H. Debar, M. Dacier and A. Wespi, “Research Report Towards a Taxonomy of Intrusion Detection Systems”, Technical Report RZ 3030, IBM Research Division, Zurich Research Laboratory, Jun., 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, BK., Jang, JS., Chung, T.M. (2002). Design of Network Security Control System for Cooperative Intrusion Detection. In: Chong, I. (eds) Information Networking: Wireless Communications Technologies and Network Applications. ICOIN 2002. Lecture Notes in Computer Science, vol 2344. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45801-8_38

Download citation

  • DOI: https://doi.org/10.1007/3-540-45801-8_38

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44255-4

  • Online ISBN: 978-3-540-45801-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics