A novel scaleable architecture for intrusion detection and mitigation in switched networks

被引:0
|
作者
Witzke, EL [1 ]
Tarman, TD [1 ]
Ghosh, S [1 ]
Woodard, G [1 ]
机构
[1] Sandia Natl Labs, Adv Networking Integrat Dept, Albuquerque, NM 87185 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
High-speed switched networks present scalability challenges to a network intrusion detection system, both in terms of the volume of data that must be analyzed, and the extent to which sensors must be inserted into the switched network to achieve comprehensive visibility. An architecture that uses a single point for intrusion assessment would quickly become overwhelmed with incoming event data from intrusion sensors that are deployed on even a moderate number of high-speed links. This is particularly true if an earnest,attack (generating many events in a short period of time) is underway. The authors propose a novel architecture that hierarchically distributes the assessment function into two assessment categories -- tactical assessment, and strategic assessment. The tactical assessment,function provides low-level event correlation and decision making,for a small sub-network (e.g:, a department LAN, an ATM switch peer group, etc.), and is capable of providing fast, real-time response when millisecond response times are required due to network attacks. The strategic assessment,function, on the other hand, implements high-level event correlation, which is useful when a larger view, of the network is required (e.g., for low intensity or distributed attacks). The tactical assessment engines interface to the strategic assessment engine by filtering and summarizing low-level events, ensuring that the strategic assessment engine's workload remains manageable. This paper describes the distributed intrusion assessment architecture in more detail, presents a few application scenarios that benefit from hierarchical attack assessment, and summarizes ongoing work in developing prototype components for this architecture.
引用
收藏
页码:395 / 399
页数:5
相关论文
共 50 条
  • [1] Intrusion detection considerations for switched networks
    Tarman, TD
    Witzke, EL
    ENABLING TECHNOLOGIES FOR LAW ENFORCEMENT AND SECURITY, 2000, 4232 : 85 - 92
  • [2] A Novel Intrusion Detection System Architecture for Internet of Things Networks
    Santos, Leonel
    Goncalves, Ramiro
    Rabadao, Carlos
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 428 - 435
  • [3] A Novel Architecture of Intrusion Detection System
    Zhang, Da
    Yeo, Chai Kiat
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 164 - 168
  • [4] Ranger, a novel intrusion detection system architecture for mobile Ad hoc networks
    Guo, Yinghua
    Gordon, Steven
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 53 - +
  • [5] IDAMN: An intrusion detection architecture for mobile networks
    Inst Eurecom, Sophia Antipolis, France
    IEEE J Sel Areas Commun, 7 (1373-1380):
  • [6] An Architecture for Resilient Intrusion Detection in IoT Networks
    Al Qurashi, Mohammed
    Angelopoulos, Constantinos Marios
    Katos, Vasilios
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [7] IDAMN: An intrusion detection architecture for mobile networks
    Samfat, D
    Molva, R
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1997, 15 (07) : 1373 - 1380
  • [8] An architecture for resilient intrusion detection in ad -hoc networks
    Al Qurashi, Mohammed
    Angelopoulos, Constantinos Marios
    Katos, Vasilios
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [9] Architecture of intrusion detection for high-speed networks
    Chen, Xun-Xun
    Fang, Bin-Xing
    Li, Lei
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2004, 41 (09): : 1481 - 1487
  • [10] A global security architecture for intrusion detection on computer networks
    Ganame, Abdoul Karim
    Bourgeois, Julien
    Bidou, Renaud
    Spies, Francois
    COMPUTERS & SECURITY, 2008, 27 (1-2) : 30 - 47