Page namespace (page_namespace ) | 0 |
Page title without namespace (page_title ) | 'Anomaly-based intrusion detection system' |
Full page title (page_prefixedtitle ) | 'Anomaly-based intrusion detection system' |
Old content model (old_content_model ) | 'wikitext' |
New content model (new_content_model ) | 'wikitext' |
Old page wikitext, before the edit (old_wikitext ) | 'An '''anomaly-based intrusion detection system''', is an [[intrusion detection system]] for detecting both network and computer intrusions and misuse by monitoring system activity and classifying it as either ''normal'' or ''anomalous''. The classification is based on [[heuristics]] or rules, rather than patterns or [[signature]]s, and attempts to detect any type of misuse that falls out of normal system operation. This is as opposed to signature-based systems, which can only detect attacks for which a signature has previously been created.<ref name="Wang2004" />
In order to positively identify attack traffic, the system must be taugt to recognize normal system activity. The two phases of a majority of anomaly detection systems consist of the training phase (where a profile of normal behaviors is built) and testing phase (where current traffic is compared with the profile created in the training phase).<ref name="Khalkhali, Azmi, Azimpour-Kivi, and Khansari" /> Anomalies are detected in several ways, most often with [[artificial intelligence]] type techniques. Systems using artificial [[neural networks]] have been used to great effect. Another method is to define what normal usage of the system comprises using a strict mathematical model, and flag any deviation from this as an attack. This is known as strict anomaly detection.<ref name = "Sasha2000"/> Other techniques used to detect anomalies include [[data mining]] methods, grammar based methods, and [[Artificial Immune System]].<ref name="Khalkhali, Azmi, Azimpour-Kivi, and Khansari" />
Network-based anomalous intrusion detection systems often provide a second line of defense to detect anomalous traffic at the physical and network layers after it has passed through a firewall or other security appliance on the border of a network. Host-based anomalous intrusion detection systems are one of the last layers of defense and reside on computer end points. They allow for fine-tuned, granular protection of end points at the application level.<ref name="Beaver2014" />
Anomaly-based Intrusion Detection at both the network and host levels have a few shortcomings; namely a high [[False positives and false negatives|false-positive]] rate and the ability to be fooled by a correctly delivered attack.<ref name = "Sasha2000"/> Attempts have been made to address these issues through techniques used by PAYL<ref name="Perdisci2008" /> and MCPAD.<ref name="Perdisci2008" />
==See also==
* [[Cfengine]] – 'cfenvd' can be utilized to do ''''''anomaly detection''''''
* [[Change detection]]
* [[DNS analytics]]
* [[Hogzilla IDS]] – is a free software (GPL) anomaly-based intrusion detection system.
* [[RRDtool]] – can be configured to flag anomalies
==References==
{{Reflist|refs=
<ref name="Wang2004">{{cite web|last=Wang|first=Ke|title=Anomalous Payload-Based Network Intrusion Detection|doi=10.1007/978-3-540-30143-1_11|work=Recent Advances in Intrusion Detection|publisher=Springer Berlin|accessdate=2011-04-22|url=http://sneakers.cs.columbia.edu/ids/publications/RAID4.PDF}}</ref>
<ref name="Khalkhali, Azmi, Azimpour-Kivi, and Khansari">{{cite web|last1=Khalkhali|first1=I|last2=Azmi|first2=R|last3=Azimpour-Kivi|first3=M|last4=Khansari|first4=M|title=Host-based web anomaly intrusion detection system, an artificial immune system approach|website=ProQuest}}</ref>
<ref name = "Sasha2000">[http://phrack.org/issues/56/11.html A strict anomaly detection model for IDS, Phrack 56 0x11, Sasha/Beetle]</ref>
<ref name="Khalkhali, Azmi, Azimpour-Kivi, and Khansari">{{cite web|last1=Khalkhali|first1=I|last2=Azmi|first2=R|last3=Azimpour-Kivi|first3=M|last4=Khansari|first4=M|title=Host-based web anomaly intrusion detection system, an artificial immune system approach|website=ProQuest}}</ref>
<ref name="Beaver2014">{{cite web|last1=Beaver|first1=K|title=Host-based IDS vs. network-based IDS: Which is better?|website=Tech Target, Search Security}}</ref>
<ref name="Perdisci2008">{{cite journal|last=Perdisci|first=Roberto|author2=Davide Ariu |author3=Prahlad Fogla |author4=Giorgio Giacinto |author5=Wenke Lee |title=McPAD : A Multiple Classifier System for Accurate Payload-based Anomaly Detection|journal=Computer Networks, Special Issue on Traffic Classification and Its Applications to Modern Networks|year=2009|volume=5|issue=6|pages=864–881|url=http://roberto.perdisci.com/publications/publication-files/McPAD-revision1.pdf?attredirects=0}}</ref>
}}
{{DEFAULTSORT:Anomaly-Based Intrusion Detection System}}
[[Category:Computer network security]]
{{compu-network-stub}}' |
New page wikitext, after the edit (new_wikitext ) | 'sunny leone' |