Summary
The fast extension of inexpensive computer networks has increased the problem of unauthorized access and tampering with data. As a response to increased threats, many Signature-based Intrusion Detection Systems have been developed. Current NIDSs are barely capable of real-time traffic analysis and detecting IDS evasion techniques on Fast Ethernet links. Gigabit Ethernet has become the actual standard for large network installations. Therefore, there is an emerging need for enhanced security analysis techniques that can keep up with the increased network throughput. This paper introduces the whole architecture of our system designed to perform intrusion detection on high-speed links and proposes the efficient Detection Engine against IDS evasion techniques that is run by FPGA logic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
B.-K. Kim, Ik-K. Kim, K.-Y. Kim, J.-S. Jang: Design and Implementation of High Performance Intrusion Detection System, ICCSA (2004).
T. Ptacek and T. Newsham: Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Secure Networks Inc (1998).
M. Roesch: Snort-Lightweight Intrusion Detection for Networks, USENIX LISA’ 99 (1999).
V. Paxson, Bro: a system for detecting network intruders in real-time, Computer Networks 31, 23–24 (1999).
D. Denning: An Intrusion Detection Model, IEEE Trans. on Software Engineering (1987).
R. Kemmerer and V. Giovanni: Intrusion Detection: A Brief History and overview, IEEE Security and Privacy, 27–30 (2002).
A. Valdes and K. Skinner: Adaptive, Model-based Monitoring for Cyber Attack Detection, RAID (2000).
Eric Hacker: IDS Evasion with Unicode, SecurityFocus Infocus (Online), Available: http://www.securityfocus.com (2001).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kang, D., Oh, J., Kim, K., Jang, J. (2005). Design and Implementation of Detection Engine Against IDS Evasion with Unicode. In: Zhang, W., Tong, W., Chen, Z., Glowinski, R. (eds) Current Trends in High Performance Computing and Its Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-27912-1_40
Download citation
DOI: https://doi.org/10.1007/3-540-27912-1_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25785-1
Online ISBN: 978-3-540-27912-9
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)