Font Size: a A A

Embedded monitors for detecting and preventing intrusions in cryptographic and application protocols

Posted on:2004-11-28Degree:M.SType:Thesis
University:University of North TexasCandidate:Joglekar, Sachin PFull Text:PDF
GTID:2468390011473205Subject:Computer Science
Abstract/Summary:
There are two main approaches for intrusion detection: signature-based and anomaly-based. Signature-based detection employs pattern matching to match attack signatures with observed data making it ideal for detecting known attacks. However, it cannot detect unknown attacks for which there is no signature available. Anomaly-based detection builds a profile of normal system behavior to detect known and unknown attacks as behavioral deviations. However, it has a drawback of a high false alarm rate. In this thesis, we describe our anomaly-based IDS designed for detecting intrusions in cryptographic and application-level protocols. Our system has several unique characteristics, such as the ability to monitor cryptographic protocols and application-level protocols embedded in encrypted sessions, a very lightweight monitoring process, and the ability to react to protocol misuse by modifying protocol response directly.
Keywords/Search Tags:Detecting, Cryptographic, Protocols
Related items