Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

An Intrusion-Detection Model

Published: 01 February 1987 Publication History

Abstract

A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.

Cited By

View all
  • (2024)Discriminative spatial-temporal feature learning for modeling network intrusion detection systemsJournal of Computer Security10.3233/JCS-22003132:1(1-30)Online publication date: 2-Feb-2024
  • (2024)The Future of Misuse DetectionCommunications of the ACM10.1145/368959667:11(27-28)Online publication date: 15-Oct-2024
  • (2024)Utilizing Threat Partitioning for More Practical Network Anomaly DetectionProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657046(83-91)Online publication date: 24-Jun-2024
  • Show More Cited By

Recommendations

Reviews

Stanley A. Kurzban

As magnetic media has replaced paper, the problem of controlling data has changed in character, if not in principle [1]. Computers have long been able to collect all the data needed for control, but the volumes involved have overwhelmed those responsible for exercising and assessing control [2]. Finally, a significant step has been taken to determine how data might be audited to give people a useful picture of what threatens it. The Intrusion Detection System (IDES) is a knowledge-based set of programs that are designed to detect those apparent changes in a user's behavior that are malicious or to detect someone who is masquerading as the user. IDES may also detect penetration attempts, subversion by Trojan horses or viruses, or resource-monopolization (called “denial of service”) attacks. IDES models users' behavior patterns in terms of login frequency; location frequency; login intervals; session duration, output, and resource usage; and login failures. Deviations from established norms are treated as indicators of potential attack. As the paper makes clear, much work in the field remains. Yet the start is very promising and is one that the author presents with the exemplary clarity, logic, and comprehensiveness that mark all of her works. Computer scientists and auditors alike will find much of value. The reviewer detected no difference between the paper under review and [3], so readers of either are advised not to seek the other.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Software Engineering
IEEE Transactions on Software Engineering  Volume 13, Issue 2
Special issue on computer security and privacy
February 1987
173 pages
ISSN:0098-5589
Issue’s Table of Contents

Publisher

IEEE Press

Publication History

Published: 01 February 1987

Author Tags

  1. Abnormal behavior
  2. auditing
  3. intrusions
  4. monitoring
  5. profiles
  6. security
  7. statistical measures

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Discriminative spatial-temporal feature learning for modeling network intrusion detection systemsJournal of Computer Security10.3233/JCS-22003132:1(1-30)Online publication date: 2-Feb-2024
  • (2024)The Future of Misuse DetectionCommunications of the ACM10.1145/368959667:11(27-28)Online publication date: 15-Oct-2024
  • (2024)Utilizing Threat Partitioning for More Practical Network Anomaly DetectionProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657046(83-91)Online publication date: 24-Jun-2024
  • (2024)RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble LearningIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.340243919(5895-5910)Online publication date: 17-May-2024
  • (2024)Attenuating majority attack class bias using hybrid deep learning based IDS frameworkJournal of Network and Computer Applications10.1016/j.jnca.2024.103954230:COnline publication date: 1-Oct-2024
  • (2024)Hack me if you canFuture Generation Computer Systems10.1016/j.future.2024.06.050160:C(926-941)Online publication date: 1-Nov-2024
  • (2024)SYNTROPYComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2024.110327244:COnline publication date: 1-May-2024
  • (2024)Scalable fuzzy multivariate outliers identification towards big data applicationsApplied Soft Computing10.1016/j.asoc.2024.111444155:COnline publication date: 1-Apr-2024
  • (2024)Enhanced IDS Using BBA and SMOTE-ENN for Imbalanced Data for CybersecuritySN Computer Science10.1007/s42979-024-03229-x5:7Online publication date: 11-Sep-2024
  • (2024)A transfer learning-based intrusion detection system for zero-day attack in communication-based train control systemCluster Computing10.1007/s10586-024-04376-927:6(8477-8492)Online publication date: 1-Sep-2024
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media