Study of Intrusion Detection Systems

(整期优先)网络出版时间:2012-03-13
/ 1
Modernnetworksystemshavemuchtroubleinsecurityvulnerabilitiessuchasbufferoverflow,bugsinMicrosoftInternet,sensornetworkroutingprotocoltoosimple,securityflawsofapplications,andoperatingsystems.Moreover,wirelessdevicessuchassmartphones,personaldigitalassistants(PDAs),andsensorshavebecomeeconomicallyfeasiblebecauseoftechnologicaladvancesinwirelesscommunicationandmanufacturingofsmallandlow-costsensors.Therearetypologiesofvulnerabilitiestobeexploitedinthesedevices.Inordertoimprovesecurities,manymechanismsareadopted,includingauthentication,cryptography,accesscontrol,andintrusiondetectionsystems(IDS).Ingeneral,intrusiondetectiontechniquescanbecategorizedintotwogroups:misusedetectionandanomalydetection.Themisusedetectionsystemsusepatternsofwell-knownattacksorweakspotsofthesystemstoidentifyintrusions.Theweaknessofmisusedetectionsystemsisunabletodetectanyfuture(unknown)intrusionuntilcorrespondingattacksignaturesareintrudedintothesignaturedatabase.Anomalydetectionmethodstrytodeterminewhetherthedeviationisfromtheestablishednormalusagepatternsornot.Thecriticalsuccessofanomalydetectionreliesonthemodelofnormalbehaviors.