Abstract

In order to overcome the disadvantages of the traditional distributed intrusion detection system, an application-layer distributed intrusion detection model based on the C/S mode is proposed here. The new model, is composed of a main system of server and several sub-systems of clients, fully utilizes detection abilities of the client by means of computing the belief dynamically, while the cost is not increased. Theoretical analysis and experimental results show that the model is a simple structure, reasonable design and higher accuracy than the traditional models.

Highlights

  • With the development of network attack techniques, the traditional protecting methods such as digital encryption, access control and security certification can not meet the security

  • An application-layer distributed intrusion detection model based on the C/S mode is proposed

  • The new model, which has the properties of the C/S mode and host-based in the application-layer, fully utilizes the detected the abilities of client by means of computing the belief dynamically and overcomes the shortcomings of the traditional distributed IDS

Read more

Summary

Introduction

With the development of network attack techniques, the traditional protecting methods such as digital encryption, access control and security certification can not meet the security. The new model, which has the properties of the C/S mode and host-based in the application-layer, fully utilizes the detected the abilities of client by means of computing the belief dynamically and overcomes the shortcomings of the traditional distributed IDS. The module of the application layer distributed intrusion detection system is shown, which includes the data monitor, data preprocessor, collaborative analyzer, risk evaluator and security manager. Their main functions are as follows: Data monitor: It can intercept packets in the network and get some important information, such as MAC/IP address, protocol type, port number and data length. The threat degree of a suspicious information is defined as follows:

Security policy update
Performance simulation and analysis
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.