Intelligent Intrusion Detection Systems Flashcards
What are the types of IDS?
Host Network Hypervisor Application Protocol Server
How does host based IDS work?
Monitor resource utilisation and audit trails of specific servers or devices.
How does network based IDS work?
Monitor and analyse traffic flows on the network
How do application based IDS work?
Separate IDS for different resources IE: Email and web
How do protocol based IDS work?
Protocols grouped together, such as those based used in web communications
How do server based IDS work?
Subnets or server groups share an IDS
What are the methods of IDS?
Misuse based
Anomaly based
Classification Based
Combination Based
How do Misuse based IDS work?
Look at patterns, signature definitions etc.
How do Anomaly based IDS work?
Statistical, machine learning or data mining approaches.
Use baselines and checks for deviations
How do classification based IDS work?
Binary or multi-classification: Decision trees, Bayes, K nearest Neighbour.
Limited in that these require pre-phase of labelling.
How do combination based IDS work?
Utilise the best of each technique but suffer from high computational costs.
What are data stream methods and what are its benefits?
Used to build models from big datasets
Don’t suffer from the concept or feature drift of batch streaming.
What is concept drift?
When a data distribution varies over time and describes the nature of network traffic
What is feature drift?
When features change over time as changes in data patterns dictate different levels of features.
What are the issues with current IDS datasets?
They are outdated by around 20 years as much of the research is still being done against DARPA and KDD datasets.