Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Statistics and Probability

2005

University of Central Florida

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

Session-Based Intrusion Detection System To Map Anomalous Network Traffic, Bruce Caulkins Jan 2005

Session-Based Intrusion Detection System To Map Anomalous Network Traffic, Bruce Caulkins

Electronic Theses and Dissertations

Computer crime is a large problem (CSI, 2004; Kabay, 2001a; Kabay, 2001b). Security managers have a variety of tools at their disposal -- firewalls, Intrusion Detection Systems (IDSs), encryption, authentication, and other hardware and software solutions to combat computer crime. Many IDS variants exist which allow security managers and engineers to identify attack network packets primarily through the use of signature detection; i.e., the IDS recognizes attack packets due to their well-known "fingerprints" or signatures as those packets cross the network's gateway threshold. On the other hand, anomaly-based ID systems determine what is normal traffic within a network and reports …