An application of information theory to intrusion detection

EE Eiland, LM Liebrock - Fourth IEEE International Workshop …, 2006 - ieeexplore.ieee.org
Fourth IEEE International Workshop on Information Assurance (IWIA'06), 2006ieeexplore.ieee.org
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system
vulnerabilities, are a serious threat. Defending against them is no easy task, however.
Having identified" degree of system knowledge" as one difference between legitimate and
illegitimate users, theorists have drawn on information theory as a basis for intrusion
detection. In particular, Kolmogorov complexity (K) has been used successfully. In this work,
we consider information distance (Observed_K-Expected_K) as a method of detecting …
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having identified "degree of system knowledge" as one difference between legitimate and illegitimate users, theorists have drawn on information theory as a basis for intrusion detection. In particular, Kolmogorov complexity (K) has been used successfully. In this work, we consider information distance (Observed_K - Expected_K) as a method of detecting system scans. Observed_K is computed directly, Expected_K is taken from compression tests shared herein. Results are encouraging. Observed scan traffic has an information distance at least an order of magnitude greater than the threshold value we determined for normal Internet traffic. With 320 KB packet blocks, separation between distributions appears to exceed 4sigma
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果