A hybrid intrusion detection and visualization system

J. Peng, C. Feng, Jerzy W Rozenblit

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

Network attacks have become the fundamental threat to today's largely interconnected computer systems, Unauthorized activities and unauthorized access account for a large proportion of these networks. Unauthorized accesses and misuse of critical data can be catastrophic to businesses, emergency services, and even threaten the defense and security of a nation. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. This paper proposes a hybrid intrusion detection and visualization system that leverages the advantages of current signature-based and anomaly detection methods. The hybrid instruction detection system deploys these two methods in a two-staged manner to identify both known and novel attacks. When intrusion is detected, autonomous agents that reside on the system will automatically take actions against misuse and abuse of computer system, thus protecting the system from internal and external attacks.

Original languageEnglish (US)
Title of host publicationProceedings of the International Symposium and Workshop on Engineering of Computer Based Systems
Pages505-506
Number of pages2
DOIs
StatePublished - 2006
Event13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems, ECBS 2006 - Potsdam, Germany
Duration: Mar 27 2006Mar 30 2006

Other

Other13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems, ECBS 2006
CountryGermany
CityPotsdam
Period3/27/063/30/06

Fingerprint

Intrusion detection
Computer systems
Visualization
Emergency services
Autonomous agents
Industry

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software

Cite this

Peng, J., Feng, C., & Rozenblit, J. W. (2006). A hybrid intrusion detection and visualization system. In Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems (pp. 505-506). [1607413] https://doi.org/10.1109/ECBS.2006.8

A hybrid intrusion detection and visualization system. / Peng, J.; Feng, C.; Rozenblit, Jerzy W.

Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems. 2006. p. 505-506 1607413.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Peng, J, Feng, C & Rozenblit, JW 2006, A hybrid intrusion detection and visualization system. in Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems., 1607413, pp. 505-506, 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems, ECBS 2006, Potsdam, Germany, 3/27/06. https://doi.org/10.1109/ECBS.2006.8
Peng J, Feng C, Rozenblit JW. A hybrid intrusion detection and visualization system. In Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems. 2006. p. 505-506. 1607413 https://doi.org/10.1109/ECBS.2006.8
Peng, J. ; Feng, C. ; Rozenblit, Jerzy W. / A hybrid intrusion detection and visualization system. Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems. 2006. pp. 505-506
@inproceedings{8e4f1b158a7b49549d741c13aa7cdee6,
title = "A hybrid intrusion detection and visualization system",
abstract = "Network attacks have become the fundamental threat to today's largely interconnected computer systems, Unauthorized activities and unauthorized access account for a large proportion of these networks. Unauthorized accesses and misuse of critical data can be catastrophic to businesses, emergency services, and even threaten the defense and security of a nation. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. This paper proposes a hybrid intrusion detection and visualization system that leverages the advantages of current signature-based and anomaly detection methods. The hybrid instruction detection system deploys these two methods in a two-staged manner to identify both known and novel attacks. When intrusion is detected, autonomous agents that reside on the system will automatically take actions against misuse and abuse of computer system, thus protecting the system from internal and external attacks.",
author = "J. Peng and C. Feng and Rozenblit, {Jerzy W}",
year = "2006",
doi = "10.1109/ECBS.2006.8",
language = "English (US)",
isbn = "0769525466",
pages = "505--506",
booktitle = "Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems",

}

TY - GEN

T1 - A hybrid intrusion detection and visualization system

AU - Peng, J.

AU - Feng, C.

AU - Rozenblit, Jerzy W

PY - 2006

Y1 - 2006

N2 - Network attacks have become the fundamental threat to today's largely interconnected computer systems, Unauthorized activities and unauthorized access account for a large proportion of these networks. Unauthorized accesses and misuse of critical data can be catastrophic to businesses, emergency services, and even threaten the defense and security of a nation. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. This paper proposes a hybrid intrusion detection and visualization system that leverages the advantages of current signature-based and anomaly detection methods. The hybrid instruction detection system deploys these two methods in a two-staged manner to identify both known and novel attacks. When intrusion is detected, autonomous agents that reside on the system will automatically take actions against misuse and abuse of computer system, thus protecting the system from internal and external attacks.

AB - Network attacks have become the fundamental threat to today's largely interconnected computer systems, Unauthorized activities and unauthorized access account for a large proportion of these networks. Unauthorized accesses and misuse of critical data can be catastrophic to businesses, emergency services, and even threaten the defense and security of a nation. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. This paper proposes a hybrid intrusion detection and visualization system that leverages the advantages of current signature-based and anomaly detection methods. The hybrid instruction detection system deploys these two methods in a two-staged manner to identify both known and novel attacks. When intrusion is detected, autonomous agents that reside on the system will automatically take actions against misuse and abuse of computer system, thus protecting the system from internal and external attacks.

UR - http://www.scopus.com/inward/record.url?scp=34250004091&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=34250004091&partnerID=8YFLogxK

U2 - 10.1109/ECBS.2006.8

DO - 10.1109/ECBS.2006.8

M3 - Conference contribution

AN - SCOPUS:34250004091

SN - 0769525466

SN - 9780769525464

SP - 505

EP - 506

BT - Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems

ER -