A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods

碩士 === 中原大學 === 資訊工程研究所 === 90 === We can model intrusion detection behaviors as two different categories, including anomaly detection and misuse detection. Major consideration for a good misuse detection system is to accumulate enough attack signatures; while the performance of anomaly detection is...

Full description

Bibliographic Details
Main Authors: Chun-Wei Lee, 李駿偉
Other Authors: Shih-Kun Huang
Format: Others
Language:zh-TW
Published: 2002
Online Access:http://ndltd.ncl.edu.tw/handle/56745470304818694072
id ndltd-TW-090CYCU5392011
record_format oai_dc
spelling ndltd-TW-090CYCU53920112015-10-13T17:35:24Z http://ndltd.ncl.edu.tw/handle/56745470304818694072 A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods 入侵偵測系統分析方法效能之定量評估 Chun-Wei Lee 李駿偉 碩士 中原大學 資訊工程研究所 90 We can model intrusion detection behaviors as two different categories, including anomaly detection and misuse detection. Major consideration for a good misuse detection system is to accumulate enough attack signatures; while the performance of anomaly detection is largely influenced by two factors: one is how to set up good section rules for the detection features; another is to design and implement analysis tools to determine the deviation apart from the normal or abnormal behavior. Choosing good detection features will not only have impact on the detection performance, but also on the overall execution efficiency. Improper selection of features will render extra overhead to the system and can’t benefit to the deployment of analysis tools. We adopt data mining approach to classify features and dynamically adapt to the most suitable one. On analysis tool selection, we focus on the environment behavior model. Constructing anomaly detector and as a set of normal behaviors for judging intrusions. We have fulfilled a system implementation and conduct experiment for analyzing detection performance of different tools, including neural network, fuzzy logic, finite state machine, and Bayesian network. In order to evaluate the detection performance of different analysis tools, we study different inclusion types and assess their relationship between analysis methods and intrusion detection performance. We focus on Port-Scan and Syn-Flooder attacks to conduct the evaluation tests. By qualitative and quantitative analysis, we explore their influence on the detection response and find out the most suitable analysis methods. Shih-Kun Huang none 黃世昆 田筱榮 2002 學位論文 ; thesis 77 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 中原大學 === 資訊工程研究所 === 90 === We can model intrusion detection behaviors as two different categories, including anomaly detection and misuse detection. Major consideration for a good misuse detection system is to accumulate enough attack signatures; while the performance of anomaly detection is largely influenced by two factors: one is how to set up good section rules for the detection features; another is to design and implement analysis tools to determine the deviation apart from the normal or abnormal behavior. Choosing good detection features will not only have impact on the detection performance, but also on the overall execution efficiency. Improper selection of features will render extra overhead to the system and can’t benefit to the deployment of analysis tools. We adopt data mining approach to classify features and dynamically adapt to the most suitable one. On analysis tool selection, we focus on the environment behavior model. Constructing anomaly detector and as a set of normal behaviors for judging intrusions. We have fulfilled a system implementation and conduct experiment for analyzing detection performance of different tools, including neural network, fuzzy logic, finite state machine, and Bayesian network. In order to evaluate the detection performance of different analysis tools, we study different inclusion types and assess their relationship between analysis methods and intrusion detection performance. We focus on Port-Scan and Syn-Flooder attacks to conduct the evaluation tests. By qualitative and quantitative analysis, we explore their influence on the detection response and find out the most suitable analysis methods.
author2 Shih-Kun Huang
author_facet Shih-Kun Huang
Chun-Wei Lee
李駿偉
author Chun-Wei Lee
李駿偉
spellingShingle Chun-Wei Lee
李駿偉
A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods
author_sort Chun-Wei Lee
title A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods
title_short A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods
title_full A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods
title_fullStr A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods
title_full_unstemmed A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods
title_sort quantitative performance evaluation on intrusion detection analysis methods
publishDate 2002
url http://ndltd.ncl.edu.tw/handle/56745470304818694072
work_keys_str_mv AT chunweilee aquantitativeperformanceevaluationonintrusiondetectionanalysismethods
AT lǐjùnwěi aquantitativeperformanceevaluationonintrusiondetectionanalysismethods
AT chunweilee rùqīnzhēncèxìtǒngfēnxīfāngfǎxiàonéngzhīdìngliàngpínggū
AT lǐjùnwěi rùqīnzhēncèxìtǒngfēnxīfāngfǎxiàonéngzhīdìngliàngpínggū
AT chunweilee quantitativeperformanceevaluationonintrusiondetectionanalysismethods
AT lǐjùnwěi quantitativeperformanceevaluationonintrusiondetectionanalysismethods
_version_ 1717782856178073600