On Real-Time Intrusion Detection and Source Identification

dc.contributor.advisorDr. Kuo-Chung Tai, Chairen_US
dc.contributor.advisorDr. Shyhtsun Felix Wu, Co-Chairen_US
dc.contributor.advisorDr. Arne A. Nilsson, Memberen_US
dc.contributor.advisorDr. Douglas S. Reeves, Memberen_US
dc.contributor.authorChang, Ho-Yenen_US
dc.date.accessioned2010-04-02T19:19:56Z
dc.date.available2010-04-02T19:19:56Z
dc.date.issued2001-01-08en_US
dc.degree.disciplineElectrical Engineeringen_US
dc.degree.levelPhD Dissertationen_US
dc.degree.namePhDen_US
dc.description.abstractThis thesis work consists of two distinct parts: a study ofreal-time intrusion detection on network link-state routingprotocol attacks (Part I), and a study of source identification for spoofed IP packets (Part II). These two parts could be united into a common framework consisting of an intrusion detection system and an intrusion response system. However, in many ways they are distinct and self-contained. In Part I, a real-time knowledge-based network intrusiondetection model for a link-state routing protocol is presented to detect different attacks for the protocol. This model includes three layers: a to parse packets and dispatch data, an to abstract predefined real-time events for the link-state routing protocol, and an to express thereal-time behavior of the protocol engine and to detect the intrusions by pattern matching. The timed FSM named JiNao Finite State Machine (JFSM) is extended from the conventional FSM with timed states, multiple timers, and time constraints on statetransitions. The JFSM is implemented as a generator which can createany FSM according to a description in a configuration file. Theresults show that this approach is very effective for real-timeintrusion detection. This approach can be extended for use in othernetwork protocol intrusion detection systems, especially for thosewith known attacks.In Part II, a security management framework, the Decentralized Source Identification System (DECIDUOUS), is presentedto identify the "true'' sources of network-based intrusions. The premise of this approach is that if an attack packet has been correctly authenticated by a certain router, the attack packet must have been transmitted through that router. It utilizes security associations to dynamically deploy secure authentication tunnels in order to further trace down the possible attackers' locations. We present the algorithms to support the tracing of multiple attacks launched from different locations, even across several administrative domains. Our results show that the DECIDUOUS system is reasonably efficient, flexible and robust. Our approach could serve as the basis for future research on different tracing strategies for different types of attacks in large-scale networks.en_US
dc.identifier.otheretd-20010107-210805en_US
dc.identifier.urihttp://www.lib.ncsu.edu/resolver/1840.16/5786
dc.rightsI hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to NC State University or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report.en_US
dc.titleOn Real-Time Intrusion Detection and Source Identificationen_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
etd.pdf
Size:
1.11 MB
Format:
Adobe Portable Document Format

Collections