Regina Awor Komakec (s0535273) March 31, 2007
1
Contents
1 Introduction 2 Background 2.1 Approaches to Intrusion Detection . . . . . . . . . . . . . . . 2.2 General Model of Intrusion Detection System (IDS) . . . . . 2.3 Types of Intrusion Detection Systems . . . . . . . . . . . . . 2.3.1 Network Layer Intrusion Detection . . . . . . . . . . . 2.3.2 Application Layer Intrusion Detection . . . . . . . . . 2.4 Network Layer and/or Application Layer Intrusion Detection 1 2 2 3 3 4 4 4 5 5 5 6 6 6 7 7 9 9 9
. . . . . .
. . . . . .
3 Research Question 3.1 Sub-Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Relevance of Research 5 Research Methods 5.1 Proposed Case Study: Distributed Multimedia Applications . . . 5.1.1 Teleconferencing . . . . . . . . . . . . . . . . . . . . . . . 5.1.2 Intrusion Detection and Teleconferencing . . . . . . . . . 6 Work Plan Appendices A Intrusion Detection (ID) Models A.1 Denning’s (1986) Intrusion Detection IDES Model . . . . . . . .
B Ideas for Applications To Study 10 B.1 Information Management . . . . . . . . . . . . . . . . . . . . . . 10 B.2 Web Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 B.3 Identity Management . . . . . . . . . . . . . . . . . . . . . . . . . 10
1
Introduction
The current trend is that it is becoming increasingly easier to attack computer systems. More people with limited computer knowledge (script kiddies) can carry out attack on poorly maintained systems, because attack tools are increasingly accessible and usable. A manifestation of this is the movement of attack tools from command-line to graphical-based tools. The Iris Network Traffic Analyzer (formally known as SpyNet) [5], for example, is a GUI (Graphical User Interface), packet sniffing tool. Information system security is important in this computer age. It goes without saying that information management is
References: [1] S. Axelsson. Intrusion detection: A survey and taxonomy. PDF document, 2000. http://www.cs.plu.edu/courses/CompSec/arts/taxonomy.pdf. 8 vacy, page 0120, 1999 Several intrusion detection models have been suggested. Denning’s (1986) IDES model forms the basis for several intrusion detection systems. Other approaches involve the use of agents for intrusion detection (Asaka, et al., 1999). A.1 Denning’s (1986) Intrusion Detection IDES Model