Timeline description of IDS

Justin J. Lister (ruf@SPi)
Tue, 22 Nov 1994 07:41:22 +1100 (EST)

G'day all,

    I want to create a historical database of Intrusion Detection
Systems that have or are currently being developed. I was interested in
finding any systems that were missing from my list. While I have alot
of the information necessary to construct the list, at the moment I
lack the time (working on a thesis). I thought that it might be useful
to post the list of systems I know about and the format for the
database records (that way anyone associated with various systems
might like to fill in the record for me). B)

Thanks for your assistance...

-----[ F O R M A T ]-------------------------------------------------

System Name:  | Research Project Name: 
Institution(s):
Contact Reference:
Author(s): | Developer(s): | Tester(s):
Project Start Date: | Project Finish Date:
System Environment(s): {System, OS, GUI, System Function, Network
  Access [Addr], # Users, ...}
Version Info: {# : Date, ...}

Keywords: 

Brief System Description: (6-12 lines)

An example record

-----------------------------------------------------------------------

System Name: Discovery.
Institution(s): TRW Information Services.
Contact Reference: ??
Author(s): William T. Tener
Project Start Date: 1986  Project Finish Date: ??
System Environment(s): IBM 3090s, MVS, ??, Credit Database, dial-up
access, 400,000 inquires/day, 120,000 access codes.
Version Info: ??

Keywords: data driven, customer profiles, pattern recognition, anomaly
detection.

Brief System Description:

Discovery searches for frequently occurring customer service access
patterns to develop a ``user profile'' of customer inquiries. Daily
customer inquiries are analyzed for error-free inquiries, which are
compared with the established customer profiles. Records which fall
within acceptable bounds (using a weighted algorithm) a dropped from
further processing, all records outside these bounds are recorded for
further processing, and a error rejection message is displayed.
Utilizes a self-learning, data driven expert system for pattern
recognition. Capable of reviewing 400,000 inquires per day, from a
potential base of 120,000 customer access codes. The system is dynamic
in its ability to detect and absorb subtle changes in user inquiry
formats over time.

-- 
+---------------------+--------------------------------------------------+
|  ____       ___     | Justin Lister                 ruf@cs.uow.edu.au  |
| |    \\   /\ __\    |     Center for Computer Security Research        |
| | |) / \_/ / |_     | Dept. Computer Science      voice: 61-42-835-114 |
| |  _ \\   /| _/     | University of Wollongong      fax: 61-42-832-807 |
| |_/ \/ \_/ |_| (tm) |     Computer Security a utopian dream...         |
|                     |       Disclaimer: dreaming is at own risk        |
+---------------------+--------------------------------------------------+