ImageVerifierCode 换一换
格式:DOCX , 页数:35 ,大小:35.91KB ,
资源ID:5724441      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/5724441.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(Manifesto of the Dagstuhl PerspectiveWorkshop.docx)为本站会员(b****6)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

Manifesto of the Dagstuhl PerspectiveWorkshop.docx

1、Manifesto of the Dagstuhl PerspectiveWorkshopNetwork attack detection and defense Manifesto of the Dagstuhl PerspectiveWorkshop,March 2nd6th, 2008Georg Carle Falko Dressler Richard A. Kemmerer Hartmut Koenig Christopher Kruegel Pavel LaskovPublished online: 24 February 2009. The Author(s) 2009. This

2、 article is published with open access at SAbstract This manifesto is the result of the PerspectiveWorkshop Network Attack Detection and Defense held inSchloss Dagstuhl (Germany) from March 2nd6th, 2008.The participants of the workshop represent researchers fromAustria, France, Norway, the Switzerla

3、nd, the United States,and Germany who work actively in the field of intrusiondetection and network monitoring. The workshop attendeesopinion was that intrusion detection and flow analysis,which have been developed as complementary approachesfor the detection of network attacks, should more stronglyc

4、ombine event detection and correlation techniques to bettermeet future challenges in future reactive security.The workshop participants considered various perspectivesto envision future network attack detection and defense.The following topics are seen as important in thefuture: the development of e

5、arly warning systems, the intro-G. CarleTU Muenchen,Munich, GermanyF. DresslerUniversity Erlangen-Nuremberg,Erlangen, GermanyR. A. KemmererUniversity of California,Santa Barbara, CA USAH. Koenig (_)BTU Cottbus,LS RNKS,PF 101344, 03013 Cottbus, Germanye-mail: koeniginformatik.tu-cottbus.deC. KruegelT

6、echnical University of Vienna,Vienna, AustriaP. LaskovFraunhofer Institute Berlin,Berlin, Germanyduction of situation awareness, the improvement of measurementtechnology, taxonomy of attacks, the application ofintrusion and fraud detection for web services, and anomalydetection.In order to realize t

7、hose visions the state of the art, thechallenges, and research priorities were identified for eachtopic by working groups. The outcome of the discussion issummarized in working group papers which are published inthe workshop proceedings. The papers were compiled by theeditors to this manifesto.Keywo

8、rds Intrusion detection Network monitoring Early warning systems Situation awareness Measurement requirements1 RationaleThe increasing dependence of human society on informationtechnology (IT) systems requires appropriate measuresto cope with their misuse. The growing potential of threats,which make

9、 these systems more and more vulnerable, iscaused by the complexity of the technologies themselvesand by the growing number of individuals that are able toabuse the systems. Subversive insiders, hackers, and terroristsget better and better opportunities for attacks. Inindustrial countries this conce

10、rns both numerous companiesand the critical infrastructures, e.g. the health care system,the traffic system, power supply, trade (in particulare-commerce), or the military protection.Reactive measures comprise beside the classical virusscanner intrusion detection and flow analysis. The developmentof

11、 intrusion detection systems began already in theeighties. Intrusion detection systems possess a prime importanceas reactive measures. A wide range of commercial intrusiondetection products has been offered meanwhile; especiallyfor misuse detection. The deployment of intrusion1316 Carle et al.detect

12、ion technology still evokes a lot of unsolved problems.These concern among others the still high false positiverate in practical use, the scalability of the supervised domains,and explanatory power of anomaly-based intrusionindications.In recent years network monitoring and flow analysishas been dev

13、eloped as a complementary approach for thedetection of network attacks. Flow analysis aims at thedetection of network anomalies based on traffic measurements.Their importance arose with the increasing appearanceof denial of service attacks and worm evasions, whichare less efficient to detect with in

14、trusion detection systems.The flow analysis community developed two approachesfor high speed data collection: flow monitoring and packetsampling. Flow monitoring aims to collect statistical informationabout specific portions of the overall network traffic,e.g. information about end-to-end transport

15、layer connections.On the other hand, packet sampling reduces the trafficusing explicit filters or statistical sampling algorithms.2 ObjectivesThe objective of the Perspective Workshop Network AttackDetection and Defense was to discuss future challenges inreactive security, in particular in intrusion

16、 detection and flowanalysis. New challenges arise as the functionality of networkmonitoring, attack detection and mitigation must besuitable for a large variety of attacks, and has to be scalablefor high data rates and number of flows. Event correlationtechniques can be used to combine results fromb

17、oth worlds. The workshop was the first one devoted to thistopic in Dagstuhl. A particular objective of this workshopwas to bring together both the intrusion detection and networkmonitoring communities, which still do their researchrelatively separated and are organized in different communities(e.g.

18、WGs SIDAR and KUVS in the German Societyof Informatics (GI) for reactive security and communicationsystems, respectively). The seminar was supposed tofoster the coordination of the research activities in bothcommunities.3 DeliverablesThe outcome of the workshop is a written manifesto, detailingthe o

19、pen issues and possible research perspectivesfor the coming 510 years according to the objectives givenabove. The manifesto was compiled by the editors listed atthe front page based on the working group papers. PavelLaskov kindly added a section on anomaly detection. Theseminar participants and the

20、composition of the workinggroups are listed in the appendix.4 Scoping4.1 Intrusion detectionThe security function intrusion detection deals with themonitoring of IT systems to detect security violations. Thedecision which activities have to be considered as securityviolations in a given context is d

21、efined by the appliedsecurity policy. Two main complementary approaches areapplied: anomaly and misuse detection. Anomaly detectionaims at the exposure of abnormal system and/or network behavior.It requires a comprehensive set of data describing thenormal system and network behavior. Although much r

22、esearchhas been done in this area, it is difficult to achieveso that anomaly detection has currently still a limited practicalimportance. Misuse detection focuses on the (automated)detection of known attacks described by patterns, called signatures.These patterns are used to identify an attack in an

23、audit data stream. This approach is applied by the majorityof the systems used in practice. Their effectiveness, however,is also still limited. Intrusion detection systems arefurther classified in network- and host-based systems. Networkintrusion detection systems analyze the network trafficto find

24、suspicious attack patterns. They have proven to be robustand are preferably applied in todays commercial products.The development of field proven host-based systemsseems to bemore difficult. Todays solutions aremostly onlyable to capture simple attacks, especially by matching singlestep signatures i

25、n audit data streams, which have to begenerated by special audit functions after a security relevantevent took place.The successful deployment of intrusion detection systemsin practice still has to cope with a number of challenges.One problem is the accuracy of the detection models(such as signature

26、s or specifications). When detectionmodels are overly restrictive, false negatives are possible.This is particularly problematic for misuse detection systemsthat specify the properties of a particular attack. Here,care must be taken that the properties are not too specificand only valid for a very n

27、arrow set of instances of thecomplete class of attacks. When attack models are overlypermissive, on the other hand, they will also match benigntraffic. This is often the case with anomaly-based systems.A result of matching benign traffic is a large number of falsepositives. False positives undermine

28、 the trust in the intrusiondetection system as they often cause lengthy investigationsof valid network traffic. A second problem faced by intrusiondetection systems is the large number of alerts thatthey produce. Network packets are at a very low level, anda single attack scenario run by an adversar

29、y (which includesscans, brute-force attacks against multiple services, etc.) canquickly generate hundreds or even thousands of individualpackets that match an attack specification. The result is hun-13Network attack detection and defense 17dreds or thousands of very similar alerts that actually refe

30、r toa single root cause. Alert correlation was proposed to inferhigh-level attack scenarios froma stream of low-level alerts.Unfortunately, the different alert formats and the difficultyof inferring strategies from low-level events make this problemchallenging.The main merit of anomaly-based intrusi

31、on detectiontechniques is their ability to detect previously unknown attacks.One might think that the collective expertise amassedin the computer security community and a sophisticatedinfrastructure for dissemination of security-related advice(e.g. vulnerability tracking systems and signature database)rule out major outbreaks of “genuinely novel” exploits. Unfortunately,signs are appearing that a wide-scale deploymentof efficient tools for obfuscation, mutation, and simpleencryption of attacks generate a huge variability of, strictlyspeaking, only “marginally novel”

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1