A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Distributed Intrusion Detection Approach for Secure Software Architecture
[chapter]
2005
Lecture Notes in Computer Science
We propose a specification-based approach to detect intrusions at architectural level. ...
This paper illustrates an approach to add security policies to a component-based system. ...
approach to detect intrusions at architectural level. ...
doi:10.1007/11494713_12
fatcat:zlz4zmvs2jfqldnr4gqumzhkce
Diversity-Based Approaches to Software Systems Security
[chapter]
2011
Communications in Computer and Information Science
One important category of the diversity-based software approaches for security purposes focuses on enabling efficient and effective dynamic monitoring of software system behavior in operation. ...
Software systems security represents a major concern as cyberattacks continue to grow in number and sophistication. ...
Examples of this approach include the Dependable Intrusion Tolerance (DIT) architecture [10] [26] , the Scalable Intrusion Tolerant Architecture (SITAR) [28] , and Hierarchical Adaptive Control for ...
doi:10.1007/978-3-642-27189-2_24
fatcat:vq4n3xqtqjbd5ekp7mmvnf4x3u
Secrobat: Secure and Robust Component-based Architectures
2006
2006 13th Asia Pacific Software Engineering Conference (APSEC'06)
Therefore, there is a strong need for a systematic engineering approach to developing secure and robust systems, especially distributed systems, by considering functional and security requirements at the ...
This paper introduces a reference architecture, called Secrobat, for creating secure and robust CBS. ...
We employ traditional information security techniques including cryptographic mechanisms, intrusion detection techniques and key distribution schemes and software security engineering approaches such as ...
doi:10.1109/apsec.2006.50
dblp:conf/apsec/VorobievH06
fatcat:b462o3f37ndydpw2a26usy4po4
Using a Cluster for Securing Embedded Systems
2016
International Journal of Advanced Computer Science and Applications
In today's increasingly interconnected world, the deployment of an Intrusion Detection System (IDS) is becoming very important for securing embedded systems from viruses, worms, attacks, etc. ...
In this paper, we propose to secure embedded systems by using a cluster of embedded cards that can run multiple instances of an IDS in a parallel way. ...
Distributed platform for intrusion detection based on multi-agents system As part of research conducted within the Equipe Architectures des Systèmes (EAS) team, a real-time distributed architecture for ...
doi:10.14569/ijacsa.2016.070923
fatcat:6uqqs62yuzctlgjkesdfr5l3pe
Model of an effective Intrusion Detection System on the LAN
2012
International Journal of Computer Applications
Among the systems, intrusion detection for identifying abnormal behavior or suspicious activities to undermine the legitimate operation of the system. ...
The objective of this paper is the design and implementation of a comprehensive architecture of IDS in a network. ...
In this paper we propose a new architecture for intrusion detection, to mix the two approaches: anomaly approach and misuse detection. ...
doi:10.5120/5586-7830
fatcat:lbyofr6y5jgm5bsbhs44utjami
A Comparison of Intrusion-Tolerant System Architectures
2011
IEEE Security and Privacy
For ITS architectures, we propose a simple taxonomy with four categories: 1. Detection-triggered 2. Algorithm-driven 3. Recovery-based 4. ...
In this paper, we will study and compare different approaches to intrusion-tolerant system architectures, focusing on three different lines of approach. ...
As the case studies above exhibit, the architecture relies heavily on AM for detecting intrusions. ...
doi:10.1109/msp.2010.145
fatcat:xnib3bv36fhzxjor24iry6onfy
Next Challenges in Bringing Artificial Immune Systems to Production in Network Security
[article]
2008
arXiv
pre-print
However, these approaches are far away from production where they are academic proof-of-concept implementations or use only a small part to protect against a certain intrusion. ...
In the network security, the artificial immune system is used to secure a network and its nodes against intrusions like viruses, worms, and trojans. ...
E.g., the packet checking cells build up a distributed intrusion detection system protecting all nodes against intrusions packed in network packets. ...
arXiv:0805.1786v1
fatcat:jfcixf2b7ra5fhi4jsva3bugja
Multiagent Systems for Network Intrusion Detection: A Review
[chapter]
2009
Advances in Intelligent and Soft Computing
More and more, Intrusion Detection Systems (IDSs) are seen as an important component in comprehensive security solutions. ...
So far, plenty of techniques have been applied for the detection of intrusions, which has been reported in many surveys. ...
AAFID (Autonomous Agents For Intrusion Detection) [26] is a distributed IDS architecture employing autonomous agents, being those defined as "software agents that perform a certain security monitoring ...
doi:10.1007/978-3-642-04091-7_18
dblp:conf/cisis-spain/HerreroC09
fatcat:qo6lklarvvgihkqwz2iqr7iofy
A Survey of parallel intrusion detection on graphical processors
2014
Open Computer Science
There is a number of intrusion detection tools using GPU tested in real network traffic. ...
AbstractIntrusion detection is enormously developing field of informatics. This paper provides a survey of actual trends in intrusion detection in academic research. ...
APVV-0008-10, APVV-0073-07 and KEGA 008TUKE-4/2013 Microlearning environment for education of information security specialists. ...
doi:10.2478/s13537-014-0213-6
fatcat:q2ihwx4pkzaajjozlr2u4yaj2y
A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET
2014
International Journal of Computer Applications
This paper aims to focus on monitored the most prominent techniques of IDS approach for determining under the conditions of critical nodes and also trigger & compare the recent Intrusion Detection mechanism ...
Intrusion Detection & Prevention System (IDPS) is one of the defence mechanisms to protect MANET against variety of attacks due to the dynamic topology, lack of centralized control, limited physical security ...
Acknowledgments I am indebted to my (PhD) guide Mrs.A.Annalakshmi for giving me an insight on intrusion detection systems. ...
doi:10.5120/14859-3230
fatcat:fngee26phfeo7dmxbnu24mouli
4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010
2010
2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)
Acknowledgments We are very grateful to the members of the Program Committee for their work with reviewing and selecting the papers, helping us to assemble a very good program. ...
It was once more a pleasure to collaborate with such a remarkable set of specialists. ...
The first paper, "SCIT and IDS Architectures for Reduced Data Ex-filtration" by Ajay Nagarajan and Arun Sood from George Mason University, USA, combines the Self-Cleansing Intrusion Tolerance (SCIT) approach ...
doi:10.1109/dsn.2010.5544420
dblp:conf/dsn/CorreiaP10
fatcat:ym7lsldwvvgbhgr27dk2kpz7rq
4th workshop on recent advances in intrusion-tolerant systems, WRAITS 2010
2010
2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)
Acknowledgments We are very grateful to the members of the Program Committee for their work with reviewing and selecting the papers, helping us to assemble a very good program. ...
It was once more a pleasure to collaborate with such a remarkable set of specialists. ...
The first paper, "SCIT and IDS Architectures for Reduced Data Ex-filtration" by Ajay Nagarajan and Arun Sood from George Mason University, USA, combines the Self-Cleansing Intrusion Tolerance (SCIT) approach ...
doi:10.1109/dsnw.2010.5542605
fatcat:wqf5xa4cqrainbr3obdyzmhkti
A Network Protection Framework through Artificial Immunity
[article]
2008
arXiv
pre-print
Current network protection systems use a collection of intelligent components - e.g. classifiers or rule-based firewall systems to detect intrusions and anomalies and to secure a network against viruses ...
It consists of a cooperative architecture, it is motivated by the human immune system, where the components correspond to artificial immune cells that are connected for their collaborative work. ...
We thank Ulrich Sorger, Zdzislaw Suchanecki, and Foued Melakessou from the University of Luxembourg for helpful discussions and the Ministre Luxembourgeois de l'education et de la recherche for additional ...
arXiv:0805.1787v1
fatcat:vqfqax2nwnehvbkh6rz3sqxtum
A prototype multiAgent network security system
2003
Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03
A system administrator who wishes to detect and handle these distributed attacks must constantly monitor his systems and communicate with other administrators around the world-a challenging task. ...
if certain suspicious events are actually part of a distributed attack, and to warn each other about possible threats. ...
None of these approaches manages to leverage the distributed automated nature of the Internet to serve as a vehicle for its own survival. ...
doi:10.1145/860575.860812
dblp:conf/atal/PedireddyV03
fatcat:cv22mvfmbzdfllx4epuhw34lnm
A prototype multiAgent network security system
2003
Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03
A system administrator who wishes to detect and handle these distributed attacks must constantly monitor his systems and communicate with other administrators around the world-a challenging task. ...
if certain suspicious events are actually part of a distributed attack, and to warn each other about possible threats. ...
None of these approaches manages to leverage the distributed automated nature of the Internet to serve as a vehicle for its own survival. ...
doi:10.1145/860722.860812
fatcat:jenqdcluaffu3j5n4hscbjhc4m
« Previous
Showing results 1 — 15 out of 23,982 results