Researchers Find Clues for Dramatically Reducing IDS Traffic Volume

  /     /     /  
Publicated : 23/11/2024   Category : security


Researchers Find Clues for Dramatically Reducing IDS Traffic Volume


Research at military labs and Towson University shows that identifying malicious activity may require much less captured data than has been the case.



Researchers at the US Army Combat Capabilities Development Commands Army Research Laboratory, the Armys corporate research laboratory (ARL), and Towson University have jointly developed techniques that should allow analysts to identify threats faster and with much less data than current methods.
In their research, the scientists found that malicious software tends to be malicious sooner, rather than later, in its network presence. This discovery has allowed them to perform analysis after transmitting much less traffic from an intrusion detection sensor to the analyst than is typically the case. The issue of intrusion detection sensor data volume has become critical as network traffic and malicious activity have both increased, leading to a dramatic increase in the sheer amount of data delivered for analysis.
The research goal is to use less than 10% of the original required data to perform analysis with less than 1% loss of security alerts. That compression will be the topic of the next phase in the research.
The research was presented in a paper at the 10th International Multi-Conference on Complexity, Informatics and Cybernetics.
Read more 
here
.
 
 
 
Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industrys most knowledgeable IT security experts. Check out the
Interop agenda
here.

Last News

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Researchers Find Clues for Dramatically Reducing IDS Traffic Volume