Intrusion Detection Systems mailing list archives

Re: Comparison of several IDS


From: vin () shore net (Vin McLellan)
Date: Tue, 26 Oct 1999 11:22:27 -0400



        Alexey Lukatsky <lukich () rocketmail com> noted the existance of a
June 1999 Los Alamos Lab report which bravely sought to compare 17 intrusion
detection systems.   (The LANL research was reportedly "undertaken at the
instigation and with the support of the Global Security Analysis Laboratory
at IBM's Zurich Research Laboratory in Rueschlikon, Switzerland.")

        Mr. Lukatsky, obviously a visitor from some other planet,  suggested
that the disinterested pronouncements of LANL should dampen or put an end to
discussion of appropriate criteria of this sort of comparative IDS evaluations. 

       I, however, can't even locate any 1999 Los Alamos report comparing IDS.  

        Anyone got a URL?  Citation?  Names of the author(s)?

        IBM's handy-dandy CyberDigest search engine pulled up eight
interesting IDS papers from Zurich/IBM (see below) for 1998 and 1999... but
nothing that captures the hubris of the report  Mr. Lukatsky mentions.

        I attach the IBM list below, so I will have company in my grousing
(because I had to add several of them to my must-read list today;-)

        Suerte,
                         _Vin

-----------  

        [Links for the papers listed below are at:
<http://domino.watson.ibm.com/library/cyberdig.nsf/zurich?SearchView&Query=F
ield+Abstract=("Intrusion+Detection")+AND+Field+PubYear>=1998+And+Field+PubY
ear<=1999&SearchMax=10>] 

   1. An Intrusion-Detection System Based on the Teiresias Pattern-Discovery
Algorithm
1999
Andreas Wespi, Marc Dacier and Herve  Debar

   2. Reference Audit Information Generation For Intrusion  Detection Systems 
1998
 H. Debar, M. Dacier, A. Wespi

   3. Towards a Taxonomy of Intrusion-Detection Systems
1998
Herve' Debar, Marc Dacier and Andreas Wespi

   4. Intrusion Detection Using Variable-Length Audit Trail  Patterns 
1999
A. Wespi, M. Dacier and H. Debar

   5. PLAS - Policy Language for Authorizations
1999
 J. L. Abad-Peiro, H. Debar, T. Schweinberger, and P. Trommler

   6. Characterizing Masqueraders For Intrusion Detection
1998
 Mehdi Nassehi

   7. An Experimentation Workbench For Intrusion  Detection Systems
1998
 H. Debar, M. Dacier, A. Wespi, S. Lampart

   8. Fixed vs. Variable-Length Patterns for Detecting  Suspicious Process
Behavior 
1998
H. Debar, M. Dacier, M. Nassehi and A.  Wespi

--------
  "Cryptography is like literacy in the Dark Ages. Infinitely potent,
for good and ill... yet basically an intellectual construct, an idea,
which by its nature will resist efforts to restrict it to bureaucrats
and others who deem only themselves worthy of such Privilege."
  _A Thinking Man's Creed for Crypto  _vbm

 *     Vin McLellan + The Privacy Guild + <vin () shore net>    *



Current thread: