The Intrusion Detection System for Peer-to-Peer Computing Environment
碩士 === 國立臺灣科技大學 === 電子工程系 === 90 === Peer-to-Peer applications, such as Napster, become popular over the past several years, but the security in Peer-to-Peer computing environment is still a challenge issue. Only one malicious Peer can influence the whole Peer-to-Peer network. In this paper, we pres...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2002
|
Online Access: | http://ndltd.ncl.edu.tw/handle/88771556980584224214 |
id |
ndltd-TW-090NTUST428032 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-090NTUST4280322015-10-13T14:41:23Z http://ndltd.ncl.edu.tw/handle/88771556980584224214 The Intrusion Detection System for Peer-to-Peer Computing Environment 點對點環境下入侵偵測系統之研究 Hung-Yi Laoi 廖泓益 碩士 國立臺灣科技大學 電子工程系 90 Peer-to-Peer applications, such as Napster, become popular over the past several years, but the security in Peer-to-Peer computing environment is still a challenge issue. Only one malicious Peer can influence the whole Peer-to-Peer network. In this paper, we present an agent-based IDS architecture, which can use in large-scale Peer-to-Peer computing environment. The centerpiece of mobile agents includes a network-based misuse detection system based on SNORT to detect network-level attacks, and a host-based anomaly detection system to detect application-level attacks. We also propose a novel window-based chi-square algorithm to detect application-level intrusions. To evaluate the performance of the proposed algorithm, we conduct a comprehensive computer simulation based on the data provided by MIT Lincoln Lab. The results indicate the proposed window-based chi-square algorithm can achieve high detection rate at 92.05% and low false rate at 2.21% for HTTP session, which is better than the existing anomaly detection schemes. Y.T Chen 陳郁堂 2002 學位論文 ; thesis 47 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣科技大學 === 電子工程系 === 90 === Peer-to-Peer applications, such as Napster, become popular over the past several years, but the security in Peer-to-Peer computing environment is still a challenge issue. Only one malicious Peer can influence the whole Peer-to-Peer network. In this paper, we present an agent-based IDS architecture, which can use in large-scale Peer-to-Peer computing environment. The centerpiece of mobile agents includes a network-based misuse detection system based on SNORT to detect network-level attacks, and a host-based anomaly detection system to detect application-level attacks. We also propose a novel window-based chi-square algorithm to detect application-level intrusions. To evaluate the performance of the proposed algorithm, we conduct a comprehensive computer simulation based on the data provided by MIT Lincoln Lab. The results indicate the proposed window-based chi-square algorithm can achieve high detection rate at 92.05% and low false rate at 2.21% for HTTP session, which is better than the existing anomaly detection schemes.
|
author2 |
Y.T Chen |
author_facet |
Y.T Chen Hung-Yi Laoi 廖泓益 |
author |
Hung-Yi Laoi 廖泓益 |
spellingShingle |
Hung-Yi Laoi 廖泓益 The Intrusion Detection System for Peer-to-Peer Computing Environment |
author_sort |
Hung-Yi Laoi |
title |
The Intrusion Detection System for Peer-to-Peer Computing Environment |
title_short |
The Intrusion Detection System for Peer-to-Peer Computing Environment |
title_full |
The Intrusion Detection System for Peer-to-Peer Computing Environment |
title_fullStr |
The Intrusion Detection System for Peer-to-Peer Computing Environment |
title_full_unstemmed |
The Intrusion Detection System for Peer-to-Peer Computing Environment |
title_sort |
intrusion detection system for peer-to-peer computing environment |
publishDate |
2002 |
url |
http://ndltd.ncl.edu.tw/handle/88771556980584224214 |
work_keys_str_mv |
AT hungyilaoi theintrusiondetectionsystemforpeertopeercomputingenvironment AT liàohóngyì theintrusiondetectionsystemforpeertopeercomputingenvironment AT hungyilaoi diǎnduìdiǎnhuánjìngxiàrùqīnzhēncèxìtǒngzhīyánjiū AT liàohóngyì diǎnduìdiǎnhuánjìngxiàrùqīnzhēncèxìtǒngzhīyánjiū AT hungyilaoi intrusiondetectionsystemforpeertopeercomputingenvironment AT liàohóngyì intrusiondetectionsystemforpeertopeercomputingenvironment |
_version_ |
1717756339057328128 |