期刊文献+

利用主机软件信息消除NIDS虚警

Use of host's software information to mitigate false positive in signature-based NIDS
在线阅读 下载PDF
导出
摘要 由于缺乏对网络主机上下文的了解,多数基于特征的NIDS(网络入侵检测系统)产生的虚警数量太多,使得管理员无法尽快将注意力集中到真正有威胁的报警上。通过改进已有的NIDS使其能够有效利用网络主机上的软件信息消除NIDS虚警的有效方法,改进后的NIDS根据已知的受监控网段内的主机软件信息,在与入侵规则做匹配之前进行预先判断,过滤掉不需要匹配的入侵规则,从而减少很多没有实际意义的报警记录。改进后的NIDS原型系统在企业内部网实施的实测结果显示,该方法确实可以达到减少虚警数量提高报警质量的目的。 For lackness of knowledge about the context of network hosts, most signature-based NIDSs produce too many false positives, which prevent the administrators from focusing their efforts on real dangerous alerts quickly. A mechanism in NIDS is proposed, which makes a decision before pattern matching to filter unnecessary intrusion rules for matching, by utilizing the sottware information of the target hosts, to mitigate false positives drastically. This method is implemented in the prototype system. The result of testing on typical intranet shows that this method surely mitigate false positives and improve quality of alerts in NIDS.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第3期538-541,共4页 Computer Engineering and Design
基金 浙江省科研基金项目(2004201) 浙江省科学技术厅基金项目
关键词 网络入侵检测系统 入侵检测 主机上下文 基于特征 虚警 NIDS intrusion detection', host context signature-based false positive
  • 相关文献

参考文献8

  • 1Masayoshi Mizutani,Shin Shirahata,Masaki Minami,et al.The design and implementation of session based NIDS[OL].2004.http://www.sfc.wide.ad.j p/~mizutani/article/sb-ids/article.pdf.
  • 2David Safford,Martin Roesch.A new approach to vulnerability management and intrusion detection[S].2003.
  • 3Steven J Scott.Threat management systems the state of intrusion detection[OL].2002.http://www.snort.org/docs/threatmanagement.pdf.
  • 4Marc Norton,Daniel Roelker.SNORT 2.0 rule optimizer[OL].2004.http://www.snort.org/docs.
  • 5Andrés Felipe Arboleda,Charles Edward Bed(o)n.Snort diagrams for developers[OL].2005.http://www,snort.org/docs.
  • 6Kruegel C,Toth T,Kirda E.Service specific anomaly detection for network intrusion detection[S].Spain:Symposium on Applied Computing,2002.
  • 7Dayioglu B,Ozgit A.Use of passive network mapping to enhance signature quality of misuse network intrusion detection systems[S].Proceedings of the Sixteenth International Symposium on Computer and Information Sciences,2001.
  • 8Antonatos S,Anagnostakis K G,Markatos E P,et al.Performance analysis of content matching intrusion detection systems[C].Proceedings of the 4th IEEE/IPSJ Symposium on Applications and Internet,2004.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部