Abstract
Intrusion Detection Systems play an invaluable role within organisations by detecting attempted attacks on their IT systems. However, Intrusion Detection Systems are complex to set-up and require large quantities of memory and processing power to effectively analyse the large volumes of network traffic involved. Behavioural analysis plays an important role within Intrusion Detection Systems by looking for suspicious behaviour or behaviour out of the ordinary within the network traffic. This paper identifies several problems that decreases the overall performance of Intrusion Detection Systems. It proposes the use of a personal smart card-based Intrusion Detection System to increase the performance and effectiveness of Intrusion Detection Systems as a whole.
Please use the following format when citing this chapter: Rossudowski, A.M., Venter, H, and Eloff, J., 2007, in IFIP International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Tryst in Complex Environments, eds. Venter, H., Eloff, M., Labuschagne, L., Eloff,.J., von Solms, R., (Boston: Springer), pp. 217–228.
Chapter PDF
Similar content being viewed by others
References
Dorothy E. Denning. An intrusion-detection model. IEEE Transactions on Software Engineering, SE-13(2):222–232, February 1987.
Biswanath Mukherjee, L. Todd Herlein, and Karl N. Levitt. Network intrusion detection. Network, IEEE, 8(3):26–41, May 1994.
Wenbao Jiang, Hua Song, and Yiqi Dai. Real-time intrusion detection for high-speed networks. Computers & security, 24:287–294, 2005.
R.D. Alexander. The search for a general theory of behaviour. Behavioural Science, 20(2):77–100, 1975.
Craig B. Stanford. The social behaviour of chimpanzees and bonobos: Empirical evidence and shifting assumptions. Current Anthropology, 39:399–420, August 1998.
S. C. Cheung and J. Kramer. An integrated method for effective behaviour analysis of distributed systems. In ICSE’ 94: Proceedings of the 16th International Conference on Software Engineering, pages 309–320, Los Alamitos, CA, USA, 1994. IEEE Computer Society Press.
Hiroaki Kitano, Minoru Asada, Yasuo Kuniyoshi, Itsuki Noda, and Eiichi Osawa. Robocup: The robot world cup initiative. In AGENTS’ 97: Proceedings of the first international conference on Autonomous agents, pages 340–347, New York, NY, USA, 1997. ACM Press.
A. Kerepesi, E. Kubinyi, G.K. Jonsson, M.S. Magnussin, and À. Miklósi. Behavioural comparison of human-animal (dog) and human-robot (aibo) interactions. Behavioural Science, 20(2):77–100, 1975.
Andreas Fuchsberger. Intrusion detection systems and intrusion prevention systems. Information Security Technical Report, 10:134–139, 2005.
John Wilander and Mariam Kamkar. A comparison of publicly available tools for static intrusion prevention. In Proceedings of the 7th Nordic Workshop on Secure IT Systems, pages 68–84, Karlstad, Sweden, November 2002.
Roberto Battistoni, Emanuele Gabrielli, and Luigi V. Mancini. A host intrusion prevention system for windows operating systems. Lecture Notes in Computer Science, 3193:352–368, 2004.
Mike Hendry. Smart Card Security and Applications. Artech House, April 2001.
Efraim Turban and Debbie McElroy. Using smart cards in electronic commerce. International Journal of Information Management, 18(1):61–72, February 1998.
Sebastian Münscher. Smartcard security. Technical report, NamITech, Giesecke & Devrient, November 2004.
Mauro Cesar Bernardes and Edson dos Santos Moreira. Implementation of an intrusion detection system based on mobile agents. In Software Engineering for Parallel and Distributed Systems, 2000. Proceedings, pages 158–164, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Rossudowski, A.M., Venter, H.S., Eloff, J.H.P. (2007). Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds) New Approaches for Security, Privacy and Trust in Complex Environments. SEC 2007. IFIP International Federation for Information Processing, vol 232. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-72367-9_19
Download citation
DOI: https://doi.org/10.1007/978-0-387-72367-9_19
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-72366-2
Online ISBN: 978-0-387-72367-9
eBook Packages: Computer ScienceComputer Science (R0)