home *** CD-ROM | disk | FTP | other *** search
- From: wetmore@toadflax.UCDavis.EDU (Brad)
- Newsgroups: alt.security
- Subject: Re: Smart Auditing (was: Auditing on C2..)
- Message-ID: <13442@ucdavis.ucdavis.edu>
- Date: 19 May 92 05:19:33 GMT
- References: <1992May18.155507.16050@sctc.com> <20790@rpp386.lonestar.org> <1992May12.121840.16789@usenet.ins.cwru.edu> <1992May12.134953.23311@pony.Ingres.COM>
- Reply-To: wetmore@cs.ucdavis.edu
- Organization: UC Davis - Department of Computer Science
-
- In article <1992May18.155507.16050@sctc.com>, smith@sctc.com (Rick
- Smith) writes:
- > Various posts on auditing have commented about the wonders of information
- > overload. I've read various things about statistical audit reduction
- > research and intrustion detection expert systems and such. Has anyone
- > had any experience with one of these?
-
- Experience, as in actual hands on systems, or knowledge of them? I'm
- working on the UCDavis DIDS (Distributed Intrusion Detection System)
- project, so I guess I can say I've had some "experience." However, I
- could give you a few pointers to the "current state of the art" if you
- would like.
-
- Most current IDS (Intrusion Detection Systems) come in two flavors,
- (I'm generalizing here, of course.) There are the statistical methods,
- which try to determine characteristics of a normal user, and then look
- for deviations from that. (A common buzzword is "anomaly detection.")
- Haystack Laboratories "Haystack" and SRI's "IDES" are two such
- examples. The second flavor are the Expert System (or Rule Based).
- These take known attacks and scan audit trails for symptoms of those
- attacks. (i.e. a write to someone's .login file, followed by that
- someone's login. Might be indicative of a trojan horse program.)
- Wisdom and Sense and parts of DIDS are examples of such programs.
-
- I have some references, if you would like them.
-
- Brad
-
- /
- O / Steal here.
- X ----------------------------------------------------------------
- O \ Brad Wetmore: wetmore@toadflax.cs.ucdavis.edu
- \ Help!!! I've been robbed. Someone stole my .sig, and sold
- it back at the UCD used .sigstore.
-
-