License
When quoting this document, please refer to the following
URN: urn:nbn:de:0030-drops-14970
URL: http://drops.dagstuhl.de/opus/volltexte/2008/1497/
Go to the corresponding Portal


Braun, Lothar ; Dressler, Falko ; Holz, Thorsten ; Kirda, Engin ; Kohlrausch, Jan ; Kruegel, Christopher ; Limmer, Tobias ; Rieck, Konrad ; Sterbenz, James

6. 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective

pdf-format:
Document 1.pdf (30 KB)


Abstract

Detection of malicious traffic is based on its input data, the information that is co-ming from network-based monitoring systems. Best detection rates would only be possible by monitoring all data transferred over all network lines in a distributed net-work. Monitoring and reporting this amount of data are feasible in neither today's, nor will be in future's systems. Later analysis like stateful inspection of the traffic imposes even more processing costs. But only at this level of monitoring and analysis there may be a chance to capture all attacks inside a system. So there needs to be a trade-off between detection success and the processing costs.

BibTeX - Entry

@InProceedings{braun_et_al:DSP:2008:1497,
  author =	{Lothar Braun and Falko Dressler and Thorsten Holz and Engin Kirda and Jan Kohlrausch and Christopher Kruegel and Tobias Limmer and Konrad Rieck and James Sterbenz},
  title =	{6. 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  year =	{2008},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"o}nig and Christopher Kruegel},
  number =	{08102},
  series =	{Dagstuhl Seminar Proceedings},
  ISSN =	{1862-4405},
  publisher =	{Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2008/1497},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and  self-protection, ma}
}

Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma
Freie Schlagwörter (deutsch): network monitoring, flow analysis, denial of service detection and response, event correlation
Seminar: 08102 - Perspectives Workshop: Network Attack Detection and Defense
Issue Date: 2008
Date of publication: 20.05.2008


DROPS-Home | Fulltext Search | Imprint Published by LZI