For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
Local Attack Detection and Intrusion Route Tracing
Midori ASAKA Masahiko TSUCHIYA Takefumi ONABUTA Shunji OKAZAWA Shigeki GOTO
IEICE TRANSACTIONS on Communications
Publication Date: 1999/11/25
Print ISSN: 0916-8516
Type of Manuscript: Special Section PAPER (Special Issue on New Paradigms in Network Management)
intrusion detection system, local attack, MLSI, intrusion route, mobile agent,
Full Text: PDF(739.5KB)>>
At the Information-technology Promotion Agency (IPA), we have been developing a network intrusion detection system called IDA (Intrusion Detection Agent system). IDA system has two distinctive features that most conventional intrusion detection systems lack. First, it has a mechanism for tracing the origin of a break-in by means of mobile agents. Second, it has a new and efficient method of detecting intrusions: rather than continuously monitoring the user's activities, it watches for an event that meets the criteria of an MLSI (Mark Left by Suspected Intruders) and may relate to an intrusion. By this method, IDA described herein can reduce the processing overhead of systems and networks. At present, IDA can detect local attacks that are initiated against a machine to which the attacker already has access and he or she attempts to exceed his or her authority. This paper mainly describes how IDA detects local attacks and traces intrusions.