Skip to:Content
|
Bottom
Cover image for Network intrusion detection and prevention : concepts and techniques
Title:
Network intrusion detection and prevention : concepts and techniques
Personal Author:
Series:
Advances in information security
Publication Information:
New York, NY : Springer, 2010
Physical Description:
xviii, 212 p. : ill. ; 24 cm.
ISBN:
9780387887708

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010205839 TK5105.59 A43 2010 Open Access Book Book
Searching...

On Order

Summary

Summary

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones.

Network Intrusion Detection and Prevention: Concepts and Techniques is designed for researchers and practitioners in industry. This book is suitable for advanced-level students in computer science as a reference book as well.


Table of Contents

1 Network Attacksp. 1
1.1 Attack Taxonomiesp. 2
1.2 Probesp. 4
1.2.1 EPSweep and PortSweepp. 5
1.2.2 NMapp. 5
1.2.3 MScanp. 5
1.2.4 SAINTp. 5
1.2.5 Satanp. 6
1.3 Privilege Escalation Attacksp. 6
1.3.1 Buffer Overflow Attacksp. 7
1.3.2 Misconfiguration Attacksp. 7
1.3.3 Race-condition Attacksp. 8
1.3.4 Man-in-the-Middle Attacksp. 9
1.3.5 Social Engineering Attacksp. 10
1.4 Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacksp. 11
1.4.1 Detection Approaches for DoS and DDoS Attacksp. 11
1.4.2 Prevention and Response for DoS and DDoS Attacksp. 13
1.4.3 Examples of DoS and DDoS Attacksp. 14
1.5 Worms Attacksp. 16
1.5.1 Modeling and Analysis of Worm Behaviorsp. 16
1.5.2 Detection and Monitoring of Worm Attacksp. 17
1.5.3 Worms Containmentp. 18
1.5.4 Examples of Well Known Worm Attacksp. 19
1.6 Routing Attacksp. 19
1.6.1 OSPF Attacksp. 20
1.6.2 BGP Attacksp. 21
Referencesp. 22
2 Detection Approachesp. 27
2.1 Misuse Detectionp. 27
2.1.1 Pattern Matchingp. 28
2.1.2 Rule-based Techniquesp. 29
2.1.3 State-based Techniquesp. 31
2.1.4 Techniques based on Data Miningp. 34
2.2 Anomaly Detectionp. 34
2.2.1 Advanced Statistical Modelsp. 36
2.2.2 Rule based Techniquesp. 37
2.2.3 Biological Modelsp. 39
2.2.4 Learning Modelsp. 40
2.3 Specification-based Detectionp. 45
2.4 Hybrid Detectionp. 46
Referencesp. 49
3 Data Collectionp. 55
3.1 Data Collection for Host-Based IDSsp. 55
3.1.1 Audit Logsp. 56
3.1.2 System Call Sequencesp. 58
3.2 Data Collection for Network-Based IDSsp. 61
3.2.1 SNMPp. 61
3.2.2 Packetsp. 62
3.2.3 Limitations of Network-Based IDSsp. 66
3.3 Data Collection for Application-Based IDSsp. 67
3.4 Data Collection for Application-Integrated IDSsp. 68
3.5 Hybrid Data Collectionp. 69
Referencesp. 69
4 Theoretical Foundation of Detectionp. 73
4.1 Taxonomy of Anomaly Detection Systemsp. 73
4.2 Fuzzy Logicp. 75
4.2.1 Fuzzy Logic in Anomaly Detectionp. 77
4.3 Bayes Theoryp. 77
4.3.1 Naive Bayes Classifierp. 78
4.3.2 Bayes Theory in Anomaly Detectionp. 78
4.4 Artificial Neural Networksp. 79
4.4.1 Processing Elementsp. 79
4.4.2 Connectionsp. 82
4.4.3 Network Architecturesp. 83
4.4.4 Learning Processp. 84
4.4.5 Artificial Neural Networks in Anomaly Detectionp. 85
4.5 Support Vector Machine (SVM)p. 86
4.5.1 Support Vector Machine in Anomaly Detectionp. 89
4.6 Evolutionary Computationp. 89
4.6.1 Evolutionary Computation in Anomaly Detectionp. 91
4.7 Association Rulesp. 92
4.7.1 The Apriori Algorithmp. 93
4.7.2 Association Rules in Anomaly Detectionp. 93
4.8 Clusteringp. 94
4.8.1 Taxonomy of Clustering Algorithmsp. 95
4.8.2 K-Means Clusteringp. 96
4.8.3 Y-Means Clusteringp. 97
4.8.4 Maximum-Likelihood Estimatesp. 98
4.8.5 Unsupervised Learning of Gaussian Datap. 100
4.8.6 Clustering Based on Density Distribution Functionsp. 101
4.8.7 Clustering in Anomaly Detectionp. 102
4.9 Signal Processing Techniques Based Modelsp. 104
4.10 Comparative Study of Anomaly Detection Techniquesp. 109
Referencesp. 110
5 Architecture and Implementationp. 115
5.1 Centralizedp. n5
5.2 Distributedp. 115
5.2.1 Intelligent Agentsp. 116
5.2.2 Mobile Agentsp. 123
5.3 Cooperative Intrusion Detectionp. 125
Referencesp. 126
6 Alert Management and Correlationp. 129
6.1 Data Fusionp. 129
6.2 Alert Correlationp. 131
6.2.1 Preprocessp. 132
6.2.2 Correlation Techniquesp. 139
6.2.3 Postprocessp. 145
6.2.4 Alert Correlation Architecturesp. 150
6.2.5 Validation of Alert Correlation Systemsp. 152
6.3 Cooperative Intrusion Detectionp. 153
6.3.1 Basic Principles of Information Sharingp. 153
6.3.2 Cooperation Based on Goal-tree Representation of Attack Strategiesp. 154
6.3.3 Cooperative Discovery of Intrusion Chainp. 154
6.3.4 Abstraction-Based Intrusion Detectionp. 155
6.3.5 Interest-Biased Communication and Cooperationp. 155
6.3.6 Agent-Based Cooperationp. 156
6.3.7 Secure Communication Using Public-key Encryptionp. 157
Referencesp. 157
7 Evaluation Criteriap. 161
7.1 Accuracyp. 161
7.1.1 False Positive and Negativep. 162
7.1.2 Confusion Matrixp. 163
7.1.3 Precision, Recall, and F-Measurep. 164
7.1.4 ROC Curvesp. 166
7.1.5 The Base-Rate Fallacyp. 168
7.2 Performancep. 171
7.3 Completenessp. 172
7.4 Timely Responsep. 172
7.5 Adaptation and Cost-Sensitivityp. 175
7.6 Intrusion Tolerance and Attack Resistancep. 177
7.6.1 Redundant and Fault Tolerance Designp. 177
7.6.2 Obstructing Methodsp. 179
7.7 Test, Evaluation and Data Setsp. 180
Referencesp. 182
8 Intrusion Responsep. 185
8.1 Response Typep. 185
8.1.1 Passive Alerting and Manual Responsep. 185
8.1.2 Active Responsep. 186
8.2 Response Approachp. 186
8.2.1 Decision Analysisp. 186
8.2.2 Control Theoryp. 189
8.2.3 Game theoryp. 189
8.2.4 Fuzzy theoryp. 190
8.3 Survivability and Intrusion Tolerancep. 194
Referencesp. 197
A Examples of Commercial and Open Source IDSsp. 199
A.l Bro Intrusion Detection Systemp. 199
A.2 Prelude Intrusion Detection Systemp. 199
A.3 Snort Intrusion Detection Systemp. 200
A.4 Ethereal Application - Network Protocol Analyzerp. 200
A.5 Multi Router Traffic Grapher (MRTG)p. 201
A.6 Tamandua Network Intrusion Detection Systemp. 202
A.7 Other Commercial IDSsp. 202
Indexp. 209
Go to:Top of Page