Multi-Devices Correlation Algorithm in Large Scale Security Analysis Platform

碩士 === 國立成功大學 === 工程科學系專班 === 97 === Current IDS is based on signature matching technique. However signature technique can not detect novel and unknown attack, if it lacks corresponding attack signatures. Many anomaly techniques based on intelligent method are then proposed to tackle with it. Unfort...

Full description

Bibliographic Details
Main Authors: Chung-Cheng Lee, 李崇誠
Other Authors: Yueh-Min Huang
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/55123795563899309386
id ndltd-TW-097NCKU5028102
record_format oai_dc
spelling ndltd-TW-097NCKU50281022016-05-04T04:25:27Z http://ndltd.ncl.edu.tw/handle/55123795563899309386 Multi-Devices Correlation Algorithm in Large Scale Security Analysis Platform 多設備關連演算法在大型安全分析平台 Chung-Cheng Lee 李崇誠 碩士 國立成功大學 工程科學系專班 97 Current IDS is based on signature matching technique. However signature technique can not detect novel and unknown attack, if it lacks corresponding attack signatures. Many anomaly techniques based on intelligent method are then proposed to tackle with it. Unfortunately these anomaly detection algorithms are still suffered from large false positives, because the normal profiles are difficult to define. We propose three multi-devices correlation algorithms to improve the security of enterprise with a signature based IDS deployed. The first one IDS-Proxy Correlation 1 (IPC1) algorithm, which correlate the IDS alert logs from proxy server more informations for experts. Another IDS-Proxy Correlation having IPC2 algorithm is proposed to verify the effectiveness and correctness of enterprise security policy. The second algorithm based on IDS-firewall correlation can trace source on network security incident and verify correctness of firewall policy. The IDS-Router correlation is our third proposed algorithm which aims at correctness of router’s ACL (Access Control List). Our test results demonstrate some of malicious web sites focus by IDS-Proxy correlation algorithm. Our tests based on polymorphic, backdoor, Trojan, E-mail server and Web Server attack which do show some useful by IDS-Firewall and IDS Router correlation. From these experiments, we believed that three there algorithms can be applied to large scale security analysis platform. Yueh-Min Huang 黃悅民 2009 學位論文 ; thesis 61 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 工程科學系專班 === 97 === Current IDS is based on signature matching technique. However signature technique can not detect novel and unknown attack, if it lacks corresponding attack signatures. Many anomaly techniques based on intelligent method are then proposed to tackle with it. Unfortunately these anomaly detection algorithms are still suffered from large false positives, because the normal profiles are difficult to define. We propose three multi-devices correlation algorithms to improve the security of enterprise with a signature based IDS deployed. The first one IDS-Proxy Correlation 1 (IPC1) algorithm, which correlate the IDS alert logs from proxy server more informations for experts. Another IDS-Proxy Correlation having IPC2 algorithm is proposed to verify the effectiveness and correctness of enterprise security policy. The second algorithm based on IDS-firewall correlation can trace source on network security incident and verify correctness of firewall policy. The IDS-Router correlation is our third proposed algorithm which aims at correctness of router’s ACL (Access Control List). Our test results demonstrate some of malicious web sites focus by IDS-Proxy correlation algorithm. Our tests based on polymorphic, backdoor, Trojan, E-mail server and Web Server attack which do show some useful by IDS-Firewall and IDS Router correlation. From these experiments, we believed that three there algorithms can be applied to large scale security analysis platform.
author2 Yueh-Min Huang
author_facet Yueh-Min Huang
Chung-Cheng Lee
李崇誠
author Chung-Cheng Lee
李崇誠
spellingShingle Chung-Cheng Lee
李崇誠
Multi-Devices Correlation Algorithm in Large Scale Security Analysis Platform
author_sort Chung-Cheng Lee
title Multi-Devices Correlation Algorithm in Large Scale Security Analysis Platform
title_short Multi-Devices Correlation Algorithm in Large Scale Security Analysis Platform
title_full Multi-Devices Correlation Algorithm in Large Scale Security Analysis Platform
title_fullStr Multi-Devices Correlation Algorithm in Large Scale Security Analysis Platform
title_full_unstemmed Multi-Devices Correlation Algorithm in Large Scale Security Analysis Platform
title_sort multi-devices correlation algorithm in large scale security analysis platform
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/55123795563899309386
work_keys_str_mv AT chungchenglee multidevicescorrelationalgorithminlargescalesecurityanalysisplatform
AT lǐchóngchéng multidevicescorrelationalgorithminlargescalesecurityanalysisplatform
AT chungchenglee duōshèbèiguānliányǎnsuànfǎzàidàxíngānquánfēnxīpíngtái
AT lǐchóngchéng duōshèbèiguānliányǎnsuànfǎzàidàxíngānquánfēnxīpíngtái
_version_ 1718257195461640192