System-Smart Intrusion Detection

Lead Research Organisation: University of York
Department Name: Computer Science

Abstract

Criminal use of the national network infrastructure is commonplace: blackmail, and phishing (social engineering) alone are significant in economic terms. These activities exploit network hosts that have been previously subverted, by attacks that are becoming increasingly sophisticated. Existing Intrusion Detection Systems (IDSs) are unable to detect new or subtle attacks, and deploying IDS sensors in higher volumes results in high report volumes, but little more effectiveness. This project will show that by taking a system design approach to the choice and configuration of sensors, together with network deployment strategies that allow flexible sensor placement, it is possible to substantially improve the detection of subtle attacks. This work does not focus on improvements to individual intrusion detection components; but rather exploits the synergy that can be obtained by combining the strengths of different types of sensor, in a holistic approach to intrusion management design.
 
Description 1) A specialist threat modeling technique can allow rigorous analysis of authentication systems; 2) A password management system is possible that detects misuse of (the same) passwords across sites. 3) Optimisation based approaches can be adopted to select optimal configurations of probe positioning across network to maximize intrusion detection (and allow tradeoffs to be made between resources and detectability)
Exploitation Route We are currently considering at whether the optimisation angle can be refined in the context of IoT
Sectors Digital/Communication/Information Technologies (including Software),Manufacturing, including Industrial Biotechology,Security and Diplomacy

 
Description We have demonstrated out work to CESG. We are also beginning to use the background expertise to apply for further funding to the EU, envisaged in 2015.
First Year Of Impact 2014
Sector Digital/Communication/Information Technologies (including Software),Security and Diplomacy