Strategic Sensor Placement for Intrusion Detection in Network-Based IDS
Автор: Longe Olumide Babatope, Lawal, Babatunde, Ibitola Ayobami
Журнал: International Journal of Intelligent Systems and Applications(IJISA) @ijisa
Статья в выпуске: 2 vol.6, 2014 года.
Бесплатный доступ
Network Intrusion Detection Systems (NIDSs) can be composed of a potentially large number of sensors, which monitor the traffic flowing in the network. Deciding where sensors should be placed and what information they need in order to detect the desired attacks can be a demanding task for network administrators, one that should be made as automatic as possible. Some few works have been done on positioning sensors using attack graph analysis, formal logic-based approach and Network Simulator NS2 which were studied to determine a strategy for sensors placement on the network. This paper analysed the major considerations for sensors placements, typical sensors deployments in NIDS, and established an extended model for sensors deployment to further strengthen the network for intrusion detection which was based on the escape of some malicious activities through the firewall.
Sensors, Placement, Intrusion Detection System, Network-Based IDPS
Короткий адрес: https://sciup.org/15010529
IDR: 15010529
Список литературы Strategic Sensor Placement for Intrusion Detection in Network-Based IDS
- NIST SP 800-92, Guide to Computer Security Log Management, available at http://csrc.nist.gov/publications/nistpubs/
- Rolando, M., Rossi, M., Sanarico, N., Mandrioli, D.: A formal approach to sensor placement and configuration in a network intrusion detection system. In: SESS 2006: Proceedings of the 2006 international workshop on Software engineering for secure systems, pp. 65–71. ACM, New York (2006).
- The BSD Syslog Protocol, http://www.ietf.org/rfc/rfc3164.txt.
- NIST SP 800-86, Guide to Integrating Forensic Techniques into Incident Response, http://csrc.nist.gov/publications/nistpubs/
- Alan Mainwaring et al, Wireless Sensor Networks for Habitat Monitoring
- Noel, S., Jajodia, S.: Attack graphs for sensor placement, alert prioritization, and attack response. In: Cyberspace Research Workshop. (2007)
- H. Chen et al, 2009. A Multi-objective Optimisation Approach to IDS Placement. Springer Berlin Heidelberg. http://link.springer.com/chapter/10.1007%2F978-3-642-04091-7_13#page-1
- The Placement of IDS Sensors. Briefing Paper by Kevin Graham. http://www.idsec.co.uk/about/briefings/ids-sensor-placement.html
- http://www.ciscopress.com/articles/article.asp?p=25327 &seqNum=4
- Yi Zou and Krishnendu Chakrabarty (2003). Sensor Deployment and Target Localization Based on Virtual Forces. IEEE INFOCOM 2003
- William Stallings & Lawrie Brown. Computer Security: Principles and Practice. Published Aug 2, 2007 by Prentice Hall. ISBN-13: 978-0-13-600424-0. 1st Edition.
- http://82.157.70.109/mirrorbooks/snortids/0596006616/snortids-CHP-5-SECT-5.html
- Jan Beutel et al. Deployment Techniques for Sensor Networks. citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.3388.