@techreport{TD:100647,
	att_abstract={{The security of the networking infrastructure (e.g., routers and switches) in large scale enterprise or Internet service provider (ISP) networks is mainly achieved through mechanisms such as access control lists (ACLs) at the edge of the network and deployment of centralized AAA (authentication, authorization and accounting) systems governing all access to network devices. However, a misconfigured edge router or a compromised user account may put the entire network at risk. In this paper, we propose enhancing existing security measures with an intrusion detection system overseeing all network management activities. We analyze device access logs collected via the AAA system, particularly TACACS+, in a global tier-1 ISP network and extract features that can be used to distinguish normal operational activities from rogue/anomalous ones. Based on our analyses, we develop a real-time intrusion detection system that constructs normal behavior models with respect to device access patterns and the configuration and control activities of individual accounts from their long-term historical logs and alerts in real-time when usage deviates from the models. Our evaluation shows that this system effectively identifies potential intrusions and misuses with an acceptable level of false alarms. 
}},
	att_authors={zg2325, rh3186, yy2364, jy1348},
	att_categories={},
	att_copyright={{Springer}},
	att_copyright_notice={{The definitive version was published in  2012. {{, 2012-09-12}}
}},
	att_donotupload={},
	att_private={false},
	att_projects={},
	att_tags={},
	att_techdoc={true},
	att_techdoc_key={TD:100647},
	att_url={http://web1.research.att.com:81/techdocs_downloads/TD:100647_DS1_2011-08-23T23:35:12.849Z.pdf},
	author={Zihui Ge and Jie Chu and Richard Huber and Ping Ji and Yung-chao Yu and Jennifer Yates},
	institution={{15th International Symposium on Research in Attacks, Intrusions and Defenses}},
	month={September},
	title={{ALERT-ID: Analyze Logs of the network Element in Real Time for Intrusion Detection}},
	year=2012,
}