Abstract
Attack Detection Systems for secure computer systems are an approach to enhancing the security of a computer system. In the past, they aimed at only providing a trail which could be useful in determining how a system was breached and who was responsible for this breach. More recently, attack detection systems have become automated tools which analyse audit data captured from a system, detect attacks as they take place and take measures to prevent further damage to the target system. The Attack Detection System (ADS) discussed in this paper is a real-time attack detection system which allocates points to users who are attempting to attack the target system, detects attacks by examining the number of points each user has been given, and takes countermeasures according to this number of points.
Chapter PDF
Similar content being viewed by others
Keywords
References
Anderson, J P Computer Security Threat Monitoring and Surveillance, Technical report, James P. Anderson Co., Fort Washington, Pennsylvania (1980).
Christmas, P Network Security Manager, Elsevier Advanced Technology, UK (1992).
Denault, M, Gritzalis, D, Karagiannis, D, Spirakis, P Intrusion Detection: Approach and Performance Issues of the SECURENET System (submitted 1993).
ECMA TR/46, Security in Open Systems - A Security Framework, European Computer Manufacturers Association (1988).
Fausett, L Fundamentals of Neural Networks: Architectures, Algorithms, and Applications, Prentice Hall International Inc. (1994).
ISO 7498–2, It formation processing systems - Open Systems Interconnection: Basic Reference Model - Security Architecture, ISO (1989).
Jackson, K A, Dubois, D H and Stallings C A ‘An Expert System Application for Network Intrusion Detection’ Proc. of the 14th National Computer Security Conference, USA (1991).
Kantzavelou, I An Attack Detection System for Secure Computer Systems, M.Sc. Thesis, 1994.
Kantzavelou I, Patel A ‘Issues of Attack in Distributed Systems - A Generic Attack Model’, Proc. of the Joint Working Conference IFIP TC-6 7C-11 and Austrian Computer Society, September 20–21, 1995, Graz, Austria, pp. 1–16.
Lunt, T F, Tamaru, A, Gilham, F, Jagannathan, R, Neumann, P G, Jalali, C, ’IDES: A Progress Report’ Proc. of the 6th Annual Computer Security Applications Conference, Tuscon, Arizona (1990).
Lunt, T, Tamaru, A, Gilham, F, Jagannathan, R, Jalali, C, Neumann, P, Javitz, H, Valdes, A, Garvey, T A Real - Time Intrusion Detection Expert System, Final Technical Report, SRI Computer Science Laboratory (1992).
Lunt, T ‘A survey of intrusion detection techniques’ Computers & Security, Vol 12 No 4 (June 1993) pp 405–418.
Pao, Y H Adaptive Pattern Recognition and Neural Networks, Addison Wesley, New York (1989).
Pfleeger, C Security in Computing, Prentice-Hall International Editions (1989).
Snapp, S R, Brentano, J, Dias, G V, Goan, T L, Heberlein, L T, Ho, C-L, Levitt, K N, Mukherjee, B, Smaha, S E, Grance, T, Teal, D M and Mansur, D ’DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and An Early Prototype’ Proc. Of the 14th National Computer Security Conference, USA (1991).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Kantzavelou, I., Patel, A. (1996). An attack detection system for secure computer systems - Design of the ADS. In: Katsikas, S.K., Gritzalis, D. (eds) Information Systems Security. SEC 1996. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-1-5041-2919-0_29
Download citation
DOI: https://doi.org/10.1007/978-1-5041-2919-0_29
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2921-3
Online ISBN: 978-1-5041-2919-0
eBook Packages: Springer Book Archive