Saturday, September 25, 2010

IDS classification (1)



Classified according to detection theory

The traditional view of property under the intrusion will be divided into two kinds of anomalies and misuse, and anomaly detection models were established, and its misuse detection model. Nearly five years has emerged a number of new detection methods, they produce abnormal and abuse of models are applicable, such as artificial immune method, genetic algorithms, data mining. According to the system used in the detection model, the IDS into three categories.
1. Anomaly detection
In anomaly detection, the observed intrusion is not known, but the study of anomalies in the communication process, it acts through the detection system changes or the use of completion. Before the establishment of the model must first be established statistical probability model, specific objects normally observed, and then decide to what extent a behavior labeled "abnormal", and how to make specific decisions.
Anomaly detection can identify those who have greater deviation from normal course of conduct, invasion can not know the specific circumstances. Due to the adaptability of various network environment is not strong, and the lack of precise criteria, to anomaly detection false alarm situation occurs frequently.
Anomaly detection can be achieved by the following system.
(1) self-learning system
Examples of self-learning system built by learning normal behavior model can be divided into two kinds of timing and non-sequential.
(2) programming system
Such systems need to be programmed to learn how to detect abnormal events identified so that users know what kind of abnormal behavior to a breach of system security. Programming system can be further subdivided into two kinds of descriptive statistics and default deny.
Anomaly detection IDS classification shown in Table 1.



2. Misuse Detection
Abuse of detection, intrusion process model and it has been observed in the traces left on the system is the decision-making. Therefore, certain characteristics can be pre-defined behavior is illegal, and then compared with observed objects in order to make identification.
Abuse detection system based on the known defects and invasion patterns, so called feature detection. It can accurately detect certain characteristics of the attack, but over-reliance on pre-defined security policy, so the system can not detect unknown attacks, resulting in leaking.
Misuse Detection uncertain decision rules on programming, can be divided into the following four:
(1) state model: it said intrusion into many different states. If you observe a suspicious behavior, all states are present, to be determined as malicious intrusion. In essence, the state model is a time series model can be further divided into state transitions and Petri nets, the former to all state intrusion into a simple traversal chain, which all states to form a more general tree structure the Petri net.
(2) Expert systems: it can describe the rules given intrusion cases, the security state of the system to reason. In general, the detection ability of a powerful expert system, flexibility is also high, but high cost calculations, usually to reduce the cost of execution speed.
(3) string matching: it through the system or the system itself between the transmission of the text generated to achieve substring matching. Less flexibility of the method is poor, but easy to understand, there are many efficient algorithms, their implementation is fast.
(4) based on a simple rule: similar to expert systems, but relatively simple, so the implementation of speed.
Misuse detection IDS classification shown in Table 2.



3. Hybrid detection

In recent years, hybrid detection increased attention has been paid. Such testing before making a decision, both the normal behavior of the system, while also observed suspicious intrusion, so to judge a more comprehensive, accurate and reliable. It is usually the normal data flow according to the background of the system to detect intrusions, Guer also called the "heuristic feature detection."
Wenke Lee inspiration from data mining to develop a hybrid detector RIPPER. It does not for different intrusion modeling, respectively, but the first by a large number of examples to learn what is and what is the intrusion of the normal behavior of the system was found to describe the system features the same usage patterns, and then the formation of abnormal and abuse are not applicable The detection model.
Feature classification according to the system
As a complete system, IDS obviously should only detector, which features many of the same system worthy of serious study. To this end, the following important features as classification considerations.
1. Detection time: Some systems in real time or near real time intrusion detection activities, while others deal with the audit system in the data, then there exists a certain delay. General history of real-time system audit data offline, the system Nenggou under previously saved the data reconstruction of 閲嶈 security incidents occurred in the past.
2. Granularity of data processing: Some systems use a continuous way of dealing with the other system is at a particular time interval the data batch operation, which involves dealing with the problem size. It has some relationship with the detection time, but they are not exactly the same, a system may be a long delay in a row within the data processing, real-time processing can also be a small amount of batch data.
3. Audit data sources: There are two main sources: the network data and host-based security log files. The latter includes the operating system kernel logs, application logs, network equipment (such as routers and firewalls) logs and so on.
4. Intrusion detection response by: divided into active and passive response response. Passive response-type system, alarm notification will be issued, there will be non-normal 鎶ュ憡 to the administrator, does not in itself trying to lower the damage, take the initiative to more Bukuai 閲囧彇 retaliatory action against the attacker. Active response system can be divided into two categories:
(1) to exercise control on the attacked system. It was attacked by adjusting the state of the system to prevent or mitigate the impact of the attacks, such as disconnected from the network, increase the security log, so kill the suspicious process.
(2) the implementation of the control system attacks the system. Such systems are more valued and used by the military.
At present, the active response system is still relatively small, even if to make active responses are generally suspicious attack disconnect the network connection, or the system call blocking suspicious, if fails, then terminate the process. However, the system exposed to a denial of service attacks, this defense generally difficult to implement.
5. Data collection sites: the audit data source may come from a single node, it may come from multiple distributed nodes in the network.
6. Data Processing Location: focus on the audit data can also be distributed processing.
7. Safety: means the system itself against attack.
8. Interoperability: IDS running different operating system platforms are different, their data sources, communication mechanism, message format are not the same, an IDS with other IDS or other security products is a measure of interoperability between its advanced and An important indicator of whether.
IDS classification system characteristics as shown in Table 3.









相关链接:



Firefox in hidden page 7



How to short-term consultants into your team



Articles ABOUT Cataloging



E-cology in the Pan Micro Series 27



TS to WMV



On the memory leak (1)



DivX to VOB



Korean media: China wielded against piracy, "sword"



GAZA: A War record of professional transition names



Premier Religion



free Visual style



Five Tips for Promotion



Brief Desktop



FLV TO 3GP



Pop-up Window Killer (on)



Taobao Alipay betrayal?



Tuesday, September 14, 2010

Master is not highly educated does not mean that high-income elite


Ph.D. in people's minds is the symbol of knowledgeable, often habitually been looking up. However, with a high degree of community, some who are interested to learn for themselves through the value of doctoral students have also felt more pressure on employment. Face the reality and expectations of balance, how should they choose Dr.?

People playing

Experience is not dominant

Xiaoyan, female, 29 years old

Doctoral: Information and Communication Engineering

Occupation: foreign staff

Current monthly income: 8,000 yuan

Graduated: January 2005

When senior year, Xiaoyan done quite well, being walked on the school's Naohiro.

Xiaoyan feel educated on the role of her job is relatively large. Looking for work, she threw only seven or eight resumes are targeted to vote for doctoral units. Reached an agreement with a foreign company after the cast.

Actual employment in the process, Xiaoyan PhD degree that the actual work for her probably played some help, compared to Master, the Doctor Zai academic foundation, algorithms, models, background knowledge, we should grasp slightly better. But the long-term in school, lack of experience also led to some disadvantages. In specific projects, there are work experience, graduate students access to the actual project, probably richer experience.

Xiaoyan after work once in career changes. A relatively small company doctoral student, she received more attention in the company, things have been given high expectations. But now where foreign companies, particularly large number of doctoral students, so she has no feeling of being special treatment.

Highly educated does not mean that high-income

Little South, M, 30-year-old doctoral programs: Globalization and the spread of new media applications

Occupation: administrative staff of a current monthly income: 4,000 yuan Graduated: January 2006

After the master degree, small south for a year, when he felt himself still young, that time will have a better chance of a PhD themselves "value added", the Dr. exam.

Little South started working in the last 89 months, due to higher expectations, so it has to set the destination of this year in January. He cast a lot of job resume, finally agreed to admit the 34 units he chose a.

Dr. Little graduated from the South feel that after the high expectations, older, have become barriers to employment. Three years of study, the time cost of large, multi-material inputs, while the outside of the situation is changing rapidly. This is basically three years out of touch with society and paid very great.

Because of the high education, small units of the South in the popular high regard, in peacetime, he can feel the work, leadership and colleagues to see his vision and his expectations are not the same. This brought him no small mental stress. Little South said he was not very specific career goals, because they decrease the psychological goal of the current income also accepted. Because older, and who bears a lot of responsibility, at present only hope that it can work, good life.

Enterprise view

Dr. appropriate bad move

NEC Electronics (China) Human Resources Hao Jiawei

NEC currently only two employees have doctoral degrees, all in Beijing, while the master account for about 40% of employees. Now the two companies is the company's first batch of doctoral staff. When they started the company, is engaged in the most basic technology development, are now entering the management.

Overall, doctoral students in the technical advantages are obvious ability, is the company welcomes people. In recent years, companies are not reluctant to recruit doctoral subjective, but candidates for doctoral students and business people need not match the standard. Now a graduate of University Dr. to a relatively small business, generally to the Institute or the University, so companies in the recruitment of doctoral candidates encountered a relatively small, a doctoral student at the candidates in finding employment needs and meet business corporate cultures even harder.

According to our experience, if the doctoral student from the course has been finished, and has not formed a fixed style of work, came after the companies are better managed. But if there is a work experience, have a certain style of work, such as lethargy, bureaucracy, etc., it is likely and where the culture is alien to such a doctorate is the enterprise more headaches.

No special treatment, Dr. Staff

New Oriental Education & Technology Group Human Resources Senior Manager Zhang Ruguo

New Oriental has a staff of about 20 people, Dr., in the proportion of staff is not big, Dr employees engaged in business management and functional management, etc., as well as some research and teaching.

Dr. employees as high-end talent, has a strong ability to learn, have a solid theoretical knowledge of the system can quickly find the play to their talents in the group stage. In practice, staff in practical work, Dr. achieved very good results, some of them have become a management and business development leader.

In the recruitment and use of talents, the new Eastern and will not be given the background of Dr special conditions, Dr. Staff also need a solid work and achieve real results can be recognized and developed.






Recommended links:



what is Avchd



f4v ps3



UC: a Master of a MS



Ps3 Xvid



Onimusha 3 details All captures



Breakthrough Nuggets Baidu Baidu PPC Union



Epson Ink Cartridge Patent New Alternative To The Situation Of Domestic Supplies Of Unknown



Expert Astrology Or BIORHYTHMS Or Mystic



Adventure And Roleplay reviews



Comment Terminal And Telnet Clients



4G Stressed Highly Versatile



Rongcheng School Link



Easy Computer Education



wma ipod



Animation With Fireworks