Font Size: a A A

Analysis of e-mail attachment signatures for potential use by intrusion detection systems

Posted on:2005-01-21Degree:M.S.E.EType:Thesis
University:West Virginia UniversityCandidate:Raje, Archis VijayFull Text:PDF
GTID:2458390008992413Subject:Engineering
Abstract/Summary:
Today, an Intrusion Detection System (IDS) is almost a necessity. The effectiveness of an IDS depends on the number of parameters it can monitor to report malicious activity. Current Intrusion Detection Systems monitor packet headers only.; This thesis investigates the possibility of monitoring network packet data as one of the parameters for IDS. This is done by finding a pattern in each type of payload. This pattern might then be related to the application to which it belongs. Based on this pattern, an attempt is made to determine if there is a difference in packets generated by different applications.; This investigation limits the classification to packets generated by E-mail attachments. Frequency of characters in packet data is used to generate a pattern. This frequency is limited to Base64 alphabets. Based on these patterns, certain E-mail attachments can be related to the source type of the attached file.
Keywords/Search Tags:Intrusion detection, E-mail, IDS, Pattern
Related items