Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository

Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
Title Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository PDF eBook
Author Phillip W. Polk
Publisher
Pages 161
Release 2001-03-01
Genre Computer security
ISBN 9781423529101

Download Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository Book in PDF, Epub and Kindle

The Air Force has multiple initiatives to develop data repositories for high-speed network intrusion detection systems (IDS). All of the developed systems utilize a relational database management system (RDBMS) as the primary data storage mechanism. The purpose of this thesis is to replace the RDBMS in one such system developed by AFRL, the Automated Intrusion Detection Environment (AIDE), with a distributed object-oriented database management system (DOODBMS) and observe a number of areas: its performance against the RDBMS in terms of IDS event insertion and retrieval, the distributed aspects of the new system, and the resulting object-oriented architecture. The resulting system, the Object- Oriented Automated Intrusion Detection Environment (OOAIDE), is designed, built, and tested using the DOODBMS Objectivity/DE. Initial tests indicate that the new system is remarkably faster than the original system in terms of event insertion. Object retrievals are also faster when more than one association is used in the query. The database is then replicated and distributed across a simple heterogeneous network with preliminary tests indicating no loss of performance. A standardized object model is also resented that can accommodate an IDS data repository built around a DOODBMS architecture.

Intrusion Detection in Distributed Systems

Intrusion Detection in Distributed Systems
Title Intrusion Detection in Distributed Systems PDF eBook
Author Peng Ning
Publisher Springer Science & Business Media
Pages 146
Release 2012-12-06
Genre Computers
ISBN 1461504678

Download Intrusion Detection in Distributed Systems Book in PDF, Epub and Kindle

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Research Directions in Database Security

Research Directions in Database Security
Title Research Directions in Database Security PDF eBook
Author Teresa F. Lunt
Publisher Springer Science & Business Media
Pages 266
Release 2012-12-06
Genre Computers
ISBN 1461228700

Download Research Directions in Database Security Book in PDF, Epub and Kindle

Many commercial and defense applications require a database system that protects data of different sensitivities while still allowing users of different clearances to access the system. This book is a collection of papers covering aspects of the emerging security technology for multilevel database systems. It contains reports on such landmark systems as SeaView, LDV, ASD, Secure Sybase, the UNISYS secure distributed system, and the secure entity-relationship system GTERM. Much of the research is concerned with the relational model, although security for the entity-relationship and object-oriented models of data are also discussed. Because the field is so new, it has been extremely difficult to learn about the research going on in this area, until now. This book will be invaluable to researchers and system designers in database systems and computer security. It will also be of interest to data users and custodians who are concerned with the security of their information. This book can also be used as a text for an advanced topics course on computer security in a computer science curriculum.

Distributed Object Architectures with CORBA

Distributed Object Architectures with CORBA
Title Distributed Object Architectures with CORBA PDF eBook
Author Henry Balen
Publisher Cambridge University Press
Pages 312
Release 2000-02-13
Genre Computers
ISBN 9780521654180

Download Distributed Object Architectures with CORBA Book in PDF, Epub and Kindle

Distributed Object Architectures with CORBA is a guide to designing software comprised of distributed components. While it is based on OMG's Common Object Request Broker Architecture (CORBA) standard, the principles also apply to architecture built with other technology (such as Microsoft's DCOM). As ORB products evolve to incorporate new additions to CORBA, the knowledge and experience required to build stable and scalable systems is not widespread. With this volume the reader can develop the skills and knowledge that are necessary for building such systems. The book assumes a familiarity with object-oriented concepts and the basics of CORBA. Software developers who are new to building systems with CORBA-based technologies will find this a useful guide to effective development.

Scientific and Technical Aerospace Reports

Scientific and Technical Aerospace Reports
Title Scientific and Technical Aerospace Reports PDF eBook
Author
Publisher
Pages 704
Release 1995
Genre Aeronautics
ISBN

Download Scientific and Technical Aerospace Reports Book in PDF, Epub and Kindle

Networks

Networks
Title Networks PDF eBook
Author Daniel Hardy
Publisher Springer Science & Business Media
Pages 768
Release 2013-12-18
Genre Technology & Engineering
ISBN 3642554989

Download Networks Book in PDF, Epub and Kindle

This handbook delivers a complete and practice-oriented overview of the fundamentals of today's telecommunications networks and the future prospects for next generation networks (NGN). The very clear and concise text is supplemented by many colour illustrations and embedded into a functional four-colour layout.

Object Management in Distributed Database Systems for Stationary and Mobile Computing Environments

Object Management in Distributed Database Systems for Stationary and Mobile Computing Environments
Title Object Management in Distributed Database Systems for Stationary and Mobile Computing Environments PDF eBook
Author Wujuan Lin
Publisher Springer Science & Business Media
Pages 178
Release 2013-11-21
Genre Computers
ISBN 144199176X

Download Object Management in Distributed Database Systems for Stationary and Mobile Computing Environments Book in PDF, Epub and Kindle

N etwork-based computing domain unifies all best research efforts presented from single computer systems to networked systems to render overwhelming computational power for several modern day applications. Although this power is expected to grow with respect to time due to tech nological advancements, application requirements impose a continuous thrust on network utilization and on the resources to deliver supreme quality of service. Strictly speaking, network-based computing dornain has no confined scope and each element offers considerable challenges. Any modern day networked application strongly thrives on efficient data storage and management system, which is essentially a Database System. There have been nurnber of books-to-date in this domain that discuss fundamental principles of designing a database systern. Research in this dornain is now far matured and rnany researchers are venturing in this dornain continuously due to a wide variety of challenges posed. In this book, our dornain of interest is in exposing the underlying key challenges in designing algorithms to handle unpredictable requests that arrive at a Distributed Database System(DDBS) and evaluating their performance. These requests are otherwise called as on-line requests arriving at a system to process. Transactions in an on-line Banking service, Airline Reservation systern, Video-on-Demand systern, etc, are few examples of on-line requests.