A Low Resource Intrusion Detection System Using Osquery

Faculty Mentor

Dr. Antonio Espinoza

Presentation Type

Poster

Start Date

May 2025

End Date

May 2025

Location

PUB NCR

Primary Discipline of Presentation

Computer Science

Abstract

Intrusion Detection Systems (IDS) are fundamental tools in monitoring and alerting system and network administrators to cyber threats occurring on those systems. An IDS is a security application that generates notifications when the system or network that the application is monitoring is under attack. The use of an IDS is a necessary tool in monitoring large networks for existing vulnerabilities that may go unnoticed by system administrators. An IDS can notify administrators when an attack is occurring, and which resources are affected by an attack. Many IDS applications at present contain resource intensive tools that draw on resources that are shared with a system running either one or more services. The intensive consumption of resources can affect two things, the first being that the resource limits of a system can affect the detection rate or accuracy of the IDS and the second is that resource consumption can affect availability of a service running on that system. In this research, I purpose an IDS that consumes minimal resources that will have acceptable detection accuracy and allow for uninterrupted access to services on a system.

This document is currently not available here.

Share

COinS
 
May 7th, 9:00 AM May 7th, 11:00 AM

A Low Resource Intrusion Detection System Using Osquery

PUB NCR

Intrusion Detection Systems (IDS) are fundamental tools in monitoring and alerting system and network administrators to cyber threats occurring on those systems. An IDS is a security application that generates notifications when the system or network that the application is monitoring is under attack. The use of an IDS is a necessary tool in monitoring large networks for existing vulnerabilities that may go unnoticed by system administrators. An IDS can notify administrators when an attack is occurring, and which resources are affected by an attack. Many IDS applications at present contain resource intensive tools that draw on resources that are shared with a system running either one or more services. The intensive consumption of resources can affect two things, the first being that the resource limits of a system can affect the detection rate or accuracy of the IDS and the second is that resource consumption can affect availability of a service running on that system. In this research, I purpose an IDS that consumes minimal resources that will have acceptable detection accuracy and allow for uninterrupted access to services on a system.