Intrusion Detection in Distributed Systems

Intrusion Detection in Distributed Systems
Title Intrusion Detection in Distributed Systems PDF eBook
Author Peng Ning
Publisher Springer Science & Business Media
Pages 146
Release 2012-12-06
Genre Computers
ISBN 1461504678

Download Intrusion Detection in Distributed Systems Book in PDF, Epub and Kindle

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Concurrent Intrusion Detection in Distributed Systems Using Assertions

Concurrent Intrusion Detection in Distributed Systems Using Assertions
Title Concurrent Intrusion Detection in Distributed Systems Using Assertions PDF eBook
Author Kiran Mantha
Publisher
Pages 220
Release 2000
Genre
ISBN

Download Concurrent Intrusion Detection in Distributed Systems Using Assertions Book in PDF, Epub and Kindle

Security in Distributed and Networking Systems

Security in Distributed and Networking Systems
Title Security in Distributed and Networking Systems PDF eBook
Author Yang Xiao
Publisher World Scientific
Pages 508
Release 2007
Genre Computers
ISBN 9812770100

Download Security in Distributed and Networking Systems Book in PDF, Epub and Kindle

Security issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing. Security issues in these systems include attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, security architectures and protocols, security theory and tools, secrecy and integrity, and trust models. This volume provides an excellent reference for students, faculty, researchers and people in the industry related to these fields.

A Basis for Intrusion Detection in Distributed Systems Using Kernel-level Data Tainting

A Basis for Intrusion Detection in Distributed Systems Using Kernel-level Data Tainting
Title A Basis for Intrusion Detection in Distributed Systems Using Kernel-level Data Tainting PDF eBook
Author Christophe Hauser
Publisher
Pages 135
Release 2013
Genre
ISBN

Download A Basis for Intrusion Detection in Distributed Systems Using Kernel-level Data Tainting Book in PDF, Epub and Kindle

Modern organisations rely intensively on information and communicationtechnology infrastructures. Such infrastructures offer a range of servicesfrom simple mail transport agents or blogs to complex e-commerce platforms,banking systems or service hosting, and all of these depend on distributedsystems. The security of these systems, with their increasing complexity, isa challenge. Cloud services are replacing traditional infrastructures byproviding lower cost alternatives for storage and computational power, butat the risk of relying on third party companies. This risk becomesparticularly critical when such services are used to host privileged companyinformation and applications, or customers' private information. Even in thecase where companies host their own information and applications, the adventof BYOD (Bring Your Own Device) leads to new security relatedissues.In response, our research investigated the characterization and detection ofmalicious activities at the operating system level and in distributedsystems composed of multiple hosts and services. We have shown thatintrusions in an operating system spawn abnormal information flows, and wedeveloped a model of dynamic information flow tracking, based on taintmarking techniques, in order to detect such abnormal behavior. We trackinformation flows between objects of the operating system (such as files,sockets, shared memory, processes, etc.) and network packetsflowing between hosts. This approach follows the anomaly detection paradigm.We specify the legal behavior of the system with respect to an informationflow policy, by stating how users and programs from groups of hosts areallowed to access or alter each other's information. Illegal informationflows are considered as intrusion symptoms. We have implemented this modelin the Linux kernel (the source code is availableat http://www.blare-ids.org), as a Linux Security Module (LSM), andwe used it as the basis for practical demonstrations. The experimentalresults validated the feasibility of our new intrusion detection principles.

Biologically Inspired Intrusion Detection in Distributed Systems

Biologically Inspired Intrusion Detection in Distributed Systems
Title Biologically Inspired Intrusion Detection in Distributed Systems PDF eBook
Author Geoffrey Franklin Roth
Publisher
Pages 126
Release 2003
Genre Computer networks
ISBN

Download Biologically Inspired Intrusion Detection in Distributed Systems Book in PDF, Epub and Kindle

"This thesis explores the possibility of using biological models to create an intrusion detection system for a distributed application."--Abstract, p. iii.

Stream Mining for Intrusion Detection in Distributed Systems

Stream Mining for Intrusion Detection in Distributed Systems
Title Stream Mining for Intrusion Detection in Distributed Systems PDF eBook
Author Matthias Balke
Publisher
Pages
Release 2011
Genre
ISBN

Download Stream Mining for Intrusion Detection in Distributed Systems Book in PDF, Epub and Kindle

Information Security for Global Information Infrastructures

Information Security for Global Information Infrastructures
Title Information Security for Global Information Infrastructures PDF eBook
Author Sihan Qing
Publisher Springer Science & Business Media
Pages 532
Release 2000-07-31
Genre Business & Economics
ISBN 9780792379140

Download Information Security for Global Information Infrastructures Book in PDF, Epub and Kindle

This book presents a state-of-the-art review of current perspectives in information security, focusing on technical as well as functional issues. It contains the selected proceedings of the Sixteenth Annual Working Conference on Information Security (SEC2000), sponsored by the International Federation for Information Processing (IFIP) and held in Beijing, China in August 2000. Topics in this volume include the latest developments in: Information security management issues Network security and protocols Information security aspects of E-commerce Distributed computing and access control New information security technologies Ethics/privacy and copyright protection £/LIST£ Information Security for Global Information Infrastructures will be essential reading for researchers in computer science, information technology, and business informatics, as well as to information security consultants, system analysts and engineers, and IT managers.