Abstract
As intrusions and other attacks become more widespread and more sophisticated, it becomes more difficult to detect them at a single intrusion detection system(IDS). Therefore, IDSs have become focused on various intrusions (and/or attacks) in large scale network environments. But, it is not easy to detect various intrusions, since the design of early IDSs are based on analyzing the audit trails supported just a single host. Here we have made effort to design and implement IDS which can detect more complex attacks as well as support security management through cooperating each others. In this paper, we present the architecture of our system that detects various intrusions in large scale network environments as well as supports flexibility, portability, and extensibility for policy based security management.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Byoung Koo Kim, D.S. Kim, and Tai M. Chung, “A Design of Integrated Intrusion Detection Systems in a Large Scale Network Environment”, APNOMS 2000, pp. 187–197, Nara, Japan, Oct., 2000.
D. E. Denning, “An Intrusion-Detection Model”, In Proceedings of the IEEE Symposium on Security and Privacy, pp. 118–131, 1986.
D. Anderson, T. Frivold and A. Valdes, “Next-gene ration intrusion detection expert system (NIDES)”, Technical Report SRI-CLS-95-07, May, 1995.
S. Kumar, “Classification and Detection of Com puter Intrusions”, Phd, Purdue University, 1995.
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip and D. Zerkle, “GrIDS-A Graph based intrusion detection system for large networks”, In Proceedings of the 19th National Information Systems Security Conference, 1996.
P. A. Porras and P. G. Neumann, “EMERALD: Event monitoring enabling responses to anomalous live disturbances”, In National Information Systems Security Conference, pp. 353–365, Baltimore, MD, Oct., 1997.
J. S. Balasubramaniyan, J. O. Garcia Fernandez, D. Isacoff, E. Spafford and D. Zamboni, “An Architecture for Intrusion Detection using Autonomous Agents”, COAST Technical Report 98/05, Jun., 1998.
C. Kahn, P. A. Porras, S. Staniford-Chen and B. Tung, “A Common Intrusion Detection Framework-data formats”, Internet draft-ietf-cidf-data-formats-00.txt, Mar., 1998.
H. Debar, M. Dacier and A. Wespi, “Research Report Towards a Taxonomy of Intrusion Detection Systems”, Technical Report RZ 3030, IBM Research Division, Zurich Research Laboratory, Jun., 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, BK., Jang, JS., Chung, T.M. (2002). Design of Network Security Control System for Cooperative Intrusion Detection. In: Chong, I. (eds) Information Networking: Wireless Communications Technologies and Network Applications. ICOIN 2002. Lecture Notes in Computer Science, vol 2344. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45801-8_38
Download citation
DOI: https://doi.org/10.1007/3-540-45801-8_38
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44255-4
Online ISBN: 978-3-540-45801-2
eBook Packages: Springer Book Archive