Abstract
Modern network attacks range from fully automated to multilayer attacks. Vulnerabilities in a system are exploited by an intelligent attacker to facilitate to do anything from denial of service (DoS) attacks to the system takeover. This paper addresses the development of an architecture that includes the use of fault tolerance and honeypot technology to provide layered protection to avoid a single point of failure.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Mellon, C.: Software Engineering Institute, CERT® Coordination Center (CERT/CC): CERT/CC Statistics (1988-2005) (2005), http://www.cert.org/stats/cert_stats.html
Intrusion Detection, Honeypots and Incident Handling Resources (2005), http://www.honeypots.ne/
Lunt, T.F., Tamaru, A., Gilham, F., Jagannathan, R., Neumann, P.G., Javitz, H., Valdes, A., Garvey, T.D.: A Real-Time Intrusion Detection Expert System (IDES)- Final Technical Report, Computer Science Laboratory, SRI International, Menlo Park, California (1992)
Heady, R., Luger, G., Maccabe, A., Servilla, M.: The Architecture of A Network Level Intrusion Detection System, Technical report, Department of Computer Science, University of New Mexico (1990)
Pearl, J.: Probabilistic Reasoning in Expert Systems. Morgan Kaufmann, San Mateo (1988)
Oka, M., Oyama, Y., Abe, H., Kato, K.: Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 10–15. Springer, Heidelberg (2004)
Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Computer Networks 48, 717–738 (2005)
Bolsky, M.I., Korn, D.G.: The KornShell Command and Programming Language. Prentice-Hall, Englewood Cliffs (1989)
Debar, H., Becker, M., Siboni, D.: A Neural Network Component for an Intrusion Detection System. In: Proceedings of 1992 IEEE Computer Society Symposium, pp. 240–250 (1992)
Nuansri, N., Dillon, T.S., Singh, S.: An Application of Neural Network and Rule-Based System for Network Management: Application Level Problems. In: 30th Hawaii International Conference on System Sciences (HICSS), Advanced Technology Track, vol. 5, pp. 474–479 (1997)
Receive Only Sniffing Cable (2005), http://www.ironcomet.com/sniffer.html
Sestito, S., Dillon, T.S.: Automated Knowledge Acquisition. Prentice Hall, New York (1994)
Nuansri, N., Dillon, T.S., Singh, S.: An application of neural network and rule- based system for network management: application level problems. In: Proceedings of the Thirtieth Hawaii International Conference, pp. 474–483 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pathak, L.D., Soh, B. (2006). Incorporating Data Mining Tools into a New Hybrid-IDS to Detect Known and Unknown Attacks. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_84
Download citation
DOI: https://doi.org/10.1007/11833529_84
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38091-7
Online ISBN: 978-3-540-38092-4
eBook Packages: Computer ScienceComputer Science (R0)