A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods
碩士 === 中原大學 === 資訊工程研究所 === 90 === We can model intrusion detection behaviors as two different categories, including anomaly detection and misuse detection. Major consideration for a good misuse detection system is to accumulate enough attack signatures; while the performance of anomaly detection is...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2002
|
Online Access: | http://ndltd.ncl.edu.tw/handle/56745470304818694072 |
id |
ndltd-TW-090CYCU5392011 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-090CYCU53920112015-10-13T17:35:24Z http://ndltd.ncl.edu.tw/handle/56745470304818694072 A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods 入侵偵測系統分析方法效能之定量評估 Chun-Wei Lee 李駿偉 碩士 中原大學 資訊工程研究所 90 We can model intrusion detection behaviors as two different categories, including anomaly detection and misuse detection. Major consideration for a good misuse detection system is to accumulate enough attack signatures; while the performance of anomaly detection is largely influenced by two factors: one is how to set up good section rules for the detection features; another is to design and implement analysis tools to determine the deviation apart from the normal or abnormal behavior. Choosing good detection features will not only have impact on the detection performance, but also on the overall execution efficiency. Improper selection of features will render extra overhead to the system and can’t benefit to the deployment of analysis tools. We adopt data mining approach to classify features and dynamically adapt to the most suitable one. On analysis tool selection, we focus on the environment behavior model. Constructing anomaly detector and as a set of normal behaviors for judging intrusions. We have fulfilled a system implementation and conduct experiment for analyzing detection performance of different tools, including neural network, fuzzy logic, finite state machine, and Bayesian network. In order to evaluate the detection performance of different analysis tools, we study different inclusion types and assess their relationship between analysis methods and intrusion detection performance. We focus on Port-Scan and Syn-Flooder attacks to conduct the evaluation tests. By qualitative and quantitative analysis, we explore their influence on the detection response and find out the most suitable analysis methods. Shih-Kun Huang none 黃世昆 田筱榮 2002 學位論文 ; thesis 77 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中原大學 === 資訊工程研究所 === 90 === We can model intrusion detection behaviors as two different categories, including anomaly detection and misuse detection. Major consideration for a good misuse detection system is to accumulate enough attack signatures; while the performance of anomaly detection is largely influenced by two factors: one is how to set up good section rules for the detection features; another is to design and implement analysis tools to determine the deviation apart from the normal or abnormal behavior.
Choosing good detection features will not only have impact on the detection performance, but also on the overall execution efficiency. Improper selection of features will render extra overhead to the system and can’t benefit to the deployment of analysis tools. We adopt data mining approach to classify features and dynamically adapt to the most suitable one.
On analysis tool selection, we focus on the environment behavior model. Constructing anomaly detector and as a set of normal behaviors for judging intrusions. We have fulfilled a system implementation and conduct experiment for analyzing detection performance of different tools, including neural network, fuzzy logic, finite state machine, and Bayesian network.
In order to evaluate the detection performance of different analysis tools, we study different inclusion types and assess their relationship between analysis methods and intrusion detection performance. We focus on Port-Scan and Syn-Flooder attacks to conduct the evaluation tests. By qualitative and quantitative analysis, we explore their influence on the detection response and find out the most suitable analysis methods.
|
author2 |
Shih-Kun Huang |
author_facet |
Shih-Kun Huang Chun-Wei Lee 李駿偉 |
author |
Chun-Wei Lee 李駿偉 |
spellingShingle |
Chun-Wei Lee 李駿偉 A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods |
author_sort |
Chun-Wei Lee |
title |
A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods |
title_short |
A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods |
title_full |
A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods |
title_fullStr |
A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods |
title_full_unstemmed |
A Quantitative Performance Evaluation on Intrusion Detection Analysis Methods |
title_sort |
quantitative performance evaluation on intrusion detection analysis methods |
publishDate |
2002 |
url |
http://ndltd.ncl.edu.tw/handle/56745470304818694072 |
work_keys_str_mv |
AT chunweilee aquantitativeperformanceevaluationonintrusiondetectionanalysismethods AT lǐjùnwěi aquantitativeperformanceevaluationonintrusiondetectionanalysismethods AT chunweilee rùqīnzhēncèxìtǒngfēnxīfāngfǎxiàonéngzhīdìngliàngpínggū AT lǐjùnwěi rùqīnzhēncèxìtǒngfēnxīfāngfǎxiàonéngzhīdìngliàngpínggū AT chunweilee quantitativeperformanceevaluationonintrusiondetectionanalysismethods AT lǐjùnwěi quantitativeperformanceevaluationonintrusiondetectionanalysismethods |
_version_ |
1717782856178073600 |