Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:

 

Advances in Computer Network Intrusion Detection

01.10.2002


Researchers from Oxford University’s Computing Laboratory have developed techniques to spot malicious attacks on computer networks, that include the use of Inductive Logic Programming (ILP) techniques to automatically determine the semantics of novel attack strategies.



Intrusions often take place where there are vulnerabilities within computer systems. For example, one of the most common of these is the buffer overflow, where an attacker sends overly long transactions to a server. The aim is to overflow the server’s buffer with code that runs automatically, allowing the attacker to execute malicious commands via the network.

A recent example was the “Code Red” worm released on Friday 13th July 2001. The attack caused havoc for programmes running on Microsoft Internet Information Server and slowed down Internet traffic considerably. No one was able to stop it automatically; few recognised what strategy the attack was using and system administrators had to look for it manually in the registers of their systems.


Existing [firewall and security] systems try to detect malicious transactions by comparing the signatures of known attacks. However, attackers can simply change subtle parameters in their attack, without altering the strategy they are using, and easily thwart such systems. Importantly, few technologies have been implemented to detect broad classes of attack strategies or to automatically generate detection strategies by learning from novel attacks.

Code Red proved that self-replicating attacks are dangerous and that systems are vulnerable. Current detection methods based on attack signatures rely on the manual analysis of registers and logs and are ineffective in the long term.

The semantic intrusion detection system developed at Oxford uses general rules rather than signatures to determine whether transactions are attempting to use a known attack strategy. Furthermore, such general rules can be generated from examples of attack attempts using the technology of ILP. An ILP system relies on knowledge represented as sets of general rules which are used explain new examples of intrusions and little interaction is required once this knowledge has been imparted.

Oxford University’s technology transfer company, Isis Innovation, has filed a UK patent application on the principles behind this invention and is interested to hear from companies that wish to license this technology for further development.

Jennifer Johnson | alfa
Further information:
http://www.isis-innovation.com

More articles from Information Technology:

nachricht CubeSats prove their worth for scientific missions
17.04.2019 | American Physical Society

nachricht Largest, fastest array of microscopic 'traffic cops' for optical communications
12.04.2019 | University of California - Berkeley

All articles from Information Technology >>>

The most recent press releases about innovation >>>

Die letzten 5 Focus-News des innovations-reports im Überblick:

Im Focus: Explosion on Jupiter-sized star 10 times more powerful than ever seen on our sun

A stellar flare 10 times more powerful than anything seen on our sun has burst from an ultracool star almost the same size as Jupiter

  • Coolest and smallest star to produce a superflare found
  • Star is a tenth of the radius of our Sun
  • Researchers led by University of Warwick could only see...

Im Focus: Quantum simulation more stable than expected

A localization phenomenon boosts the accuracy of solving quantum many-body problems with quantum computers which are otherwise challenging for conventional computers. This brings such digital quantum simulation within reach on quantum devices available today.

Quantum computers promise to solve certain computational problems exponentially faster than any classical machine. “A particularly promising application is the...

Im Focus: Largest, fastest array of microscopic 'traffic cops' for optical communications

The technology could revolutionize how information travels through data centers and artificial intelligence networks

Engineers at the University of California, Berkeley have built a new photonic switch that can control the direction of light passing through optical fibers...

Im Focus: A long-distance relationship in femtoseconds

Physicists observe how electron-hole pairs drift apart at ultrafast speed, but still remain strongly bound.

Modern electronics relies on ultrafast charge motion on ever shorter length scales. Physicists from Regensburg and Gothenburg have now succeeded in resolving a...

Im Focus: Researchers 3D print metamaterials with novel optical properties

Engineers create novel optical devices, including a moth eye-inspired omnidirectional microwave antenna

A team of engineers at Tufts University has developed a series of 3D printed metamaterials with unique microwave or optical properties that go beyond what is...

All Focus news of the innovation-report >>>

Anzeige

Anzeige

VideoLinks
Industry & Economy
Event News

Revered mathematicians and computer scientists converge with 200 young researchers in Heidelberg!

17.04.2019 | Event News

First dust conference in the Central Asian part of the earth’s dust belt

15.04.2019 | Event News

Fraunhofer FHR at the IEEE Radar Conference 2019 in Boston, USA

09.04.2019 | Event News

 
Latest News

New automated biological-sample analysis systems to accelerate disease detection

18.04.2019 | Life Sciences

Explosion on Jupiter-sized star 10 times more powerful than ever seen on our sun

18.04.2019 | Physics and Astronomy

New eDNA technology used to quickly assess coral reefs

18.04.2019 | Life Sciences

VideoLinks
Science & Research
Overview of more VideoLinks >>>