Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS

We present the design and implementation of a collaborative intrusion detection system (CIDS) for accurate and efficient intrusion detection in a distributed system. CIDS employs multiple specialized detectors at the different layers - network, kernel and application - and a manager based framework...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Yu-Sung Wu, Foo, B., Mei, Y., Bagchi, S.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 244
container_issue
container_start_page 234
container_title
container_volume
creator Yu-Sung Wu
Foo, B.
Mei, Y.
Bagchi, S.
description We present the design and implementation of a collaborative intrusion detection system (CIDS) for accurate and efficient intrusion detection in a distributed system. CIDS employs multiple specialized detectors at the different layers - network, kernel and application - and a manager based framework for aggregating the alarms from the different detectors to provide a combined alarm for an intrusion. The premise is that a carefully designed and configured CIDS can increase the accuracy of detection compared to individual detectors, without a substantial degradation in performance. In order to validate the premise, we present the design and implementation of a CIDS which employs Snort, Libsafe, and a new kernel level IDS called Sysmon. The manager has a graph-based and a Bayesian network based aggregation method for combining the alarms to finally come up with a decision about the intrusion. The system is evaluated using a Web-based electronic store front application and under three different classes of attacks - buffer overflow, flooding and script-based attacks. The results show performance degradations compared to no detection of 3.9% and 6.3% under normal workload and a buffer overflow attack respectively. The experiments to evaluate the accuracy of the system show that the normal workload generates false alarms for Snort and the elementary detectors produce missed alarms. CIDS does not flag the false alarm and reduces the incidence of missed alarms to 1 of the 7 cases. CIDS can also be used to measure the propagation time of an intrusion which is useful in choosing an appropriate response strategy.
doi_str_mv 10.1109/CSAC.2003.1254328
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1254328</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1254328</ieee_id><sourcerecordid>1254328</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-ada1af0412d96d3052d8253d177fbd6565fa48cc11c7b33faa59419d2f1947733</originalsourceid><addsrcrecordid>eNotUEtLAzEYDIig1P0B4iVHPWzNl8dm462sr0LBQ_XkoXybB0T3IdlU6b93xc5l5jAzDEPIJbAlADO3zXbVLDljYglcScHrE1IYXTNdGcWZBHlGimn6YDOkklrAOXlvxq7DdkyY47encchpP8VxoM5nb_Ofmg5T9j29btb325s7ijQk7P3PmD5pGBNFa_dz2lMcHPUhRBv9kOlsviCnAbvJF0dekLfHh9fmudy8PK2b1aaMoFUu0SFgmOdxZyonmOKu5ko40Dq0rlKVCihrawGsboUIiMpIMI4HMFJrIRbk6r83eu93Xyn2mA674wXiF5EcURo</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yu-Sung Wu ; Foo, B. ; Mei, Y. ; Bagchi, S.</creator><creatorcontrib>Yu-Sung Wu ; Foo, B. ; Mei, Y. ; Bagchi, S.</creatorcontrib><description>We present the design and implementation of a collaborative intrusion detection system (CIDS) for accurate and efficient intrusion detection in a distributed system. CIDS employs multiple specialized detectors at the different layers - network, kernel and application - and a manager based framework for aggregating the alarms from the different detectors to provide a combined alarm for an intrusion. The premise is that a carefully designed and configured CIDS can increase the accuracy of detection compared to individual detectors, without a substantial degradation in performance. In order to validate the premise, we present the design and implementation of a CIDS which employs Snort, Libsafe, and a new kernel level IDS called Sysmon. The manager has a graph-based and a Bayesian network based aggregation method for combining the alarms to finally come up with a decision about the intrusion. The system is evaluated using a Web-based electronic store front application and under three different classes of attacks - buffer overflow, flooding and script-based attacks. The results show performance degradations compared to no detection of 3.9% and 6.3% under normal workload and a buffer overflow attack respectively. The experiments to evaluate the accuracy of the system show that the normal workload generates false alarms for Snort and the elementary detectors produce missed alarms. CIDS does not flag the false alarm and reduces the incidence of missed alarms to 1 of the 7 cases. CIDS can also be used to measure the propagation time of an intrusion which is useful in choosing an appropriate response strategy.</description><identifier>ISBN: 9780769520414</identifier><identifier>ISBN: 0769520413</identifier><identifier>DOI: 10.1109/CSAC.2003.1254328</identifier><language>eng</language><publisher>IEEE</publisher><subject>Aggregates ; Application software ; Bayesian methods ; Buffer overflow ; Collaboration ; Degradation ; Detectors ; Distributed computing ; Intrusion detection ; Kernel</subject><ispartof>19th Annual Computer Security Applications Conference, 2003. Proceedings, 2003, p.234-244</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1254328$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1254328$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yu-Sung Wu</creatorcontrib><creatorcontrib>Foo, B.</creatorcontrib><creatorcontrib>Mei, Y.</creatorcontrib><creatorcontrib>Bagchi, S.</creatorcontrib><title>Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS</title><title>19th Annual Computer Security Applications Conference, 2003. Proceedings</title><addtitle>CSAC</addtitle><description>We present the design and implementation of a collaborative intrusion detection system (CIDS) for accurate and efficient intrusion detection in a distributed system. CIDS employs multiple specialized detectors at the different layers - network, kernel and application - and a manager based framework for aggregating the alarms from the different detectors to provide a combined alarm for an intrusion. The premise is that a carefully designed and configured CIDS can increase the accuracy of detection compared to individual detectors, without a substantial degradation in performance. In order to validate the premise, we present the design and implementation of a CIDS which employs Snort, Libsafe, and a new kernel level IDS called Sysmon. The manager has a graph-based and a Bayesian network based aggregation method for combining the alarms to finally come up with a decision about the intrusion. The system is evaluated using a Web-based electronic store front application and under three different classes of attacks - buffer overflow, flooding and script-based attacks. The results show performance degradations compared to no detection of 3.9% and 6.3% under normal workload and a buffer overflow attack respectively. The experiments to evaluate the accuracy of the system show that the normal workload generates false alarms for Snort and the elementary detectors produce missed alarms. CIDS does not flag the false alarm and reduces the incidence of missed alarms to 1 of the 7 cases. CIDS can also be used to measure the propagation time of an intrusion which is useful in choosing an appropriate response strategy.</description><subject>Aggregates</subject><subject>Application software</subject><subject>Bayesian methods</subject><subject>Buffer overflow</subject><subject>Collaboration</subject><subject>Degradation</subject><subject>Detectors</subject><subject>Distributed computing</subject><subject>Intrusion detection</subject><subject>Kernel</subject><isbn>9780769520414</isbn><isbn>0769520413</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotUEtLAzEYDIig1P0B4iVHPWzNl8dm462sr0LBQ_XkoXybB0T3IdlU6b93xc5l5jAzDEPIJbAlADO3zXbVLDljYglcScHrE1IYXTNdGcWZBHlGimn6YDOkklrAOXlvxq7DdkyY47encchpP8VxoM5nb_Ofmg5T9j29btb325s7ijQk7P3PmD5pGBNFa_dz2lMcHPUhRBv9kOlsviCnAbvJF0dekLfHh9fmudy8PK2b1aaMoFUu0SFgmOdxZyonmOKu5ko40Dq0rlKVCihrawGsboUIiMpIMI4HMFJrIRbk6r83eu93Xyn2mA674wXiF5EcURo</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Yu-Sung Wu</creator><creator>Foo, B.</creator><creator>Mei, Y.</creator><creator>Bagchi, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS</title><author>Yu-Sung Wu ; Foo, B. ; Mei, Y. ; Bagchi, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-ada1af0412d96d3052d8253d177fbd6565fa48cc11c7b33faa59419d2f1947733</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Aggregates</topic><topic>Application software</topic><topic>Bayesian methods</topic><topic>Buffer overflow</topic><topic>Collaboration</topic><topic>Degradation</topic><topic>Detectors</topic><topic>Distributed computing</topic><topic>Intrusion detection</topic><topic>Kernel</topic><toplevel>online_resources</toplevel><creatorcontrib>Yu-Sung Wu</creatorcontrib><creatorcontrib>Foo, B.</creatorcontrib><creatorcontrib>Mei, Y.</creatorcontrib><creatorcontrib>Bagchi, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yu-Sung Wu</au><au>Foo, B.</au><au>Mei, Y.</au><au>Bagchi, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS</atitle><btitle>19th Annual Computer Security Applications Conference, 2003. Proceedings</btitle><stitle>CSAC</stitle><date>2003</date><risdate>2003</risdate><spage>234</spage><epage>244</epage><pages>234-244</pages><isbn>9780769520414</isbn><isbn>0769520413</isbn><abstract>We present the design and implementation of a collaborative intrusion detection system (CIDS) for accurate and efficient intrusion detection in a distributed system. CIDS employs multiple specialized detectors at the different layers - network, kernel and application - and a manager based framework for aggregating the alarms from the different detectors to provide a combined alarm for an intrusion. The premise is that a carefully designed and configured CIDS can increase the accuracy of detection compared to individual detectors, without a substantial degradation in performance. In order to validate the premise, we present the design and implementation of a CIDS which employs Snort, Libsafe, and a new kernel level IDS called Sysmon. The manager has a graph-based and a Bayesian network based aggregation method for combining the alarms to finally come up with a decision about the intrusion. The system is evaluated using a Web-based electronic store front application and under three different classes of attacks - buffer overflow, flooding and script-based attacks. The results show performance degradations compared to no detection of 3.9% and 6.3% under normal workload and a buffer overflow attack respectively. The experiments to evaluate the accuracy of the system show that the normal workload generates false alarms for Snort and the elementary detectors produce missed alarms. CIDS does not flag the false alarm and reduces the incidence of missed alarms to 1 of the 7 cases. CIDS can also be used to measure the propagation time of an intrusion which is useful in choosing an appropriate response strategy.</abstract><pub>IEEE</pub><doi>10.1109/CSAC.2003.1254328</doi><tpages>11</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780769520414
ispartof 19th Annual Computer Security Applications Conference, 2003. Proceedings, 2003, p.234-244
issn
language eng
recordid cdi_ieee_primary_1254328
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Aggregates
Application software
Bayesian methods
Buffer overflow
Collaboration
Degradation
Detectors
Distributed computing
Intrusion detection
Kernel
title Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T22%3A47%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Collaborative%20intrusion%20detection%20system%20(CIDS):%20a%20framework%20for%20accurate%20and%20efficient%20IDS&rft.btitle=19th%20Annual%20Computer%20Security%20Applications%20Conference,%202003.%20Proceedings&rft.au=Yu-Sung%20Wu&rft.date=2003&rft.spage=234&rft.epage=244&rft.pages=234-244&rft.isbn=9780769520414&rft.isbn_list=0769520413&rft_id=info:doi/10.1109/CSAC.2003.1254328&rft_dat=%3Cieee_6IE%3E1254328%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1254328&rfr_iscdi=true