DocumentCode :
869347
Title :
Behavior-based network security goes mainstream
Author :
Geer, David
Volume :
39
Issue :
3
fYear :
2006
fDate :
3/1/2006 12:00:00 AM
Firstpage :
14
Lastpage :
17
Abstract :
Traditional network-based security examines traffic for code patterns or signatures that have been part of past intrusions or virus attacks. If known malicious code is found, security systems stop the suspect transmission. Although this approach can be effective, it also has limitations. For example, signature-based security frequently has trouble recognizing new types of attacks or older kinds in which known code strings have been altered somewhat, an approach many hackers use. Behavior-based security, on the other hand, learns the normal behavior of traffic and systems and then continually examines them for potentially harmful anomalies and for behavior that frequently accompanies incidents. This approach recognizes attacks based on what they do, rather than whether their code matches strings used in a specific past incident. Several vendors are thus beginning to make behavior-based security widely available to organizations via services, appliances, and software products. And some ISPs are protecting their entire networks via behavior-based services. However, widespread adoption of behavior-based security faces numerous obstacles, including complexity and a higher number of false positives than signature-based systems.
Keywords :
computer crime; computer network management; telecommunication security; telecommunication traffic; behavior-based network security; malicious code patterns; network traffic; Books; Computer worms; Data security; Dictionaries; Intrusion detection; Jacobian matrices; Pattern analysis; Search engines; Telecommunication traffic; Traffic control; Behavior-based security; Security;
fLanguage :
English
Journal_Title :
Computer
Publisher :
ieee
ISSN :
0018-9162
Type :
jour
DOI :
10.1109/MC.2006.84
Filename :
1607942
Link To Document :
بازگشت