Filters








23,982 Hits in 4.3 sec

A Distributed Intrusion Detection Approach for Secure Software Architecture [chapter]

Paola Inverardi, Leonardo Mostarda
2005 Lecture Notes in Computer Science  
We propose a specification-based approach to detect intrusions at architectural level.  ...  This paper illustrates an approach to add security policies to a component-based system.  ...  approach to detect intrusions at architectural level.  ... 
doi:10.1007/11494713_12 fatcat:zlz4zmvs2jfqldnr4gqumzhkce

Diversity-Based Approaches to Software Systems Security [chapter]

Abdelouahed Gherbi, Robert Charpentier
2011 Communications in Computer and Information Science  
One important category of the diversity-based software approaches for security purposes focuses on enabling efficient and effective dynamic monitoring of software system behavior in operation.  ...  Software systems security represents a major concern as cyberattacks continue to grow in number and sophistication.  ...  Examples of this approach include the Dependable Intrusion Tolerance (DIT) architecture [10] [26] , the Scalable Intrusion Tolerant Architecture (SITAR) [28] , and Hierarchical Adaptive Control for  ... 
doi:10.1007/978-3-642-27189-2_24 fatcat:vq4n3xqtqjbd5ekp7mmvnf4x3u

Secrobat: Secure and Robust Component-based Architectures

Artem Vorobiev, Jun Han
2006 2006 13th Asia Pacific Software Engineering Conference (APSEC'06)  
Therefore, there is a strong need for a systematic engineering approach to developing secure and robust systems, especially distributed systems, by considering functional and security requirements at the  ...  This paper introduces a reference architecture, called Secrobat, for creating secure and robust CBS.  ...  We employ traditional information security techniques including cryptographic mechanisms, intrusion detection techniques and key distribution schemes and software security engineering approaches such as  ... 
doi:10.1109/apsec.2006.50 dblp:conf/apsec/VorobievH06 fatcat:b462o3f37ndydpw2a26usy4po4

Using a Cluster for Securing Embedded Systems

Mohamed Salim, Khalid BOUKHDIR, Hicham MEDROMI, Siham BENHADOU
2016 International Journal of Advanced Computer Science and Applications  
In today's increasingly interconnected world, the deployment of an Intrusion Detection System (IDS) is becoming very important for securing embedded systems from viruses, worms, attacks, etc.  ...  In this paper, we propose to secure embedded systems by using a cluster of embedded cards that can run multiple instances of an IDS in a parallel way.  ...  Distributed platform for intrusion detection based on multi-agents system As part of research conducted within the Equipe Architectures des Systèmes (EAS) team, a real-time distributed architecture for  ... 
doi:10.14569/ijacsa.2016.070923 fatcat:6uqqs62yuzctlgjkesdfr5l3pe

Model of an effective Intrusion Detection System on the LAN

Yousef FARHAOUI, Ahmed ASIMI
2012 International Journal of Computer Applications  
Among the systems, intrusion detection for identifying abnormal behavior or suspicious activities to undermine the legitimate operation of the system.  ...  The objective of this paper is the design and implementation of a comprehensive architecture of IDS in a network.  ...  In this paper we propose a new architecture for intrusion detection, to mix the two approaches: anomaly approach and misuse detection.  ... 
doi:10.5120/5586-7830 fatcat:lbyofr6y5jgm5bsbhs44utjami

A Comparison of Intrusion-Tolerant System Architectures

Quyen Nguyen, Arun Sood
2011 IEEE Security and Privacy  
For ITS architectures, we propose a simple taxonomy with four categories: 1. Detection-triggered 2. Algorithm-driven 3. Recovery-based 4.  ...  In this paper, we will study and compare different approaches to intrusion-tolerant system architectures, focusing on three different lines of approach.  ...  As the case studies above exhibit, the architecture relies heavily on AM for detecting intrusions.  ... 
doi:10.1109/msp.2010.145 fatcat:xnib3bv36fhzxjor24iry6onfy

Next Challenges in Bringing Artificial Immune Systems to Production in Network Security [article]

Michael Hilker
2008 arXiv   pre-print
However, these approaches are far away from production where they are academic proof-of-concept implementations or use only a small part to protect against a certain intrusion.  ...  In the network security, the artificial immune system is used to secure a network and its nodes against intrusions like viruses, worms, and trojans.  ...  E.g., the packet checking cells build up a distributed intrusion detection system protecting all nodes against intrusions packed in network packets.  ... 
arXiv:0805.1786v1 fatcat:jfcixf2b7ra5fhi4jsva3bugja

Multiagent Systems for Network Intrusion Detection: A Review [chapter]

Álvaro Herrero, Emilio Corchado
2009 Advances in Intelligent and Soft Computing  
More and more, Intrusion Detection Systems (IDSs) are seen as an important component in comprehensive security solutions.  ...  So far, plenty of techniques have been applied for the detection of intrusions, which has been reported in many surveys.  ...  AAFID (Autonomous Agents For Intrusion Detection) [26] is a distributed IDS architecture employing autonomous agents, being those defined as "software agents that perform a certain security monitoring  ... 
doi:10.1007/978-3-642-04091-7_18 dblp:conf/cisis-spain/HerreroC09 fatcat:qo6lklarvvgihkqwz2iqr7iofy

A Survey of parallel intrusion detection on graphical processors

Liberios Vokorokos, Michal Ennert, Marek >Čajkovský, Ján Radušovský
2014 Open Computer Science  
There is a number of intrusion detection tools using GPU tested in real network traffic.  ...  AbstractIntrusion detection is enormously developing field of informatics. This paper provides a survey of actual trends in intrusion detection in academic research.  ...  APVV-0008-10, APVV-0073-07 and KEGA 008TUKE-4/2013 Microlearning environment for education of information security specialists.  ... 
doi:10.2478/s13537-014-0213-6 fatcat:q2ihwx4pkzaajjozlr2u4yaj2y

A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET

R. Arunkumar, A. Annalakshmi
2014 International Journal of Computer Applications  
This paper aims to focus on monitored the most prominent techniques of IDS approach for determining under the conditions of critical nodes and also trigger & compare the recent Intrusion Detection mechanism  ...  Intrusion Detection & Prevention System (IDPS) is one of the defence mechanisms to protect MANET against variety of attacks due to the dynamic topology, lack of centralized control, limited physical security  ...  Acknowledgments I am indebted to my (PhD) guide Mrs.A.Annalakshmi for giving me an insight on intrusion detection systems.  ... 
doi:10.5120/14859-3230 fatcat:fngee26phfeo7dmxbnu24mouli

4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010

Miguel Correia, Patha Pal
2010 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)  
Acknowledgments We are very grateful to the members of the Program Committee for their work with reviewing and selecting the papers, helping us to assemble a very good program.  ...  It was once more a pleasure to collaborate with such a remarkable set of specialists.  ...  The first paper, "SCIT and IDS Architectures for Reduced Data Ex-filtration" by Ajay Nagarajan and Arun Sood from George Mason University, USA, combines the Self-Cleansing Intrusion Tolerance (SCIT) approach  ... 
doi:10.1109/dsn.2010.5544420 dblp:conf/dsn/CorreiaP10 fatcat:ym7lsldwvvgbhgr27dk2kpz7rq

4th workshop on recent advances in intrusion-tolerant systems, WRAITS 2010

Miguel Correia, Patha Pal
2010 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)  
Acknowledgments We are very grateful to the members of the Program Committee for their work with reviewing and selecting the papers, helping us to assemble a very good program.  ...  It was once more a pleasure to collaborate with such a remarkable set of specialists.  ...  The first paper, "SCIT and IDS Architectures for Reduced Data Ex-filtration" by Ajay Nagarajan and Arun Sood from George Mason University, USA, combines the Self-Cleansing Intrusion Tolerance (SCIT) approach  ... 
doi:10.1109/dsnw.2010.5542605 fatcat:wqf5xa4cqrainbr3obdyzmhkti

A Network Protection Framework through Artificial Immunity [article]

Michael Hilker, Christoph Schommer
2008 arXiv   pre-print
Current network protection systems use a collection of intelligent components - e.g. classifiers or rule-based firewall systems to detect intrusions and anomalies and to secure a network against viruses  ...  It consists of a cooperative architecture, it is motivated by the human immune system, where the components correspond to artificial immune cells that are connected for their collaborative work.  ...  We thank Ulrich Sorger, Zdzislaw Suchanecki, and Foued Melakessou from the University of Luxembourg for helpful discussions and the Ministre Luxembourgeois de l'education et de la recherche for additional  ... 
arXiv:0805.1787v1 fatcat:vqfqax2nwnehvbkh6rz3sqxtum

A prototype multiAgent network security system

Taraka Pedireddy, José M. Vidal
2003 Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03  
A system administrator who wishes to detect and handle these distributed attacks must constantly monitor his systems and communicate with other administrators around the world-a challenging task.  ...  if certain suspicious events are actually part of a distributed attack, and to warn each other about possible threats.  ...  None of these approaches manages to leverage the distributed automated nature of the Internet to serve as a vehicle for its own survival.  ... 
doi:10.1145/860575.860812 dblp:conf/atal/PedireddyV03 fatcat:cv22mvfmbzdfllx4epuhw34lnm

A prototype multiAgent network security system

Taraka Pedireddy, José M. Vidal
2003 Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03  
A system administrator who wishes to detect and handle these distributed attacks must constantly monitor his systems and communicate with other administrators around the world-a challenging task.  ...  if certain suspicious events are actually part of a distributed attack, and to warn each other about possible threats.  ...  None of these approaches manages to leverage the distributed automated nature of the Internet to serve as a vehicle for its own survival.  ... 
doi:10.1145/860722.860812 fatcat:jenqdcluaffu3j5n4hscbjhc4m
« Previous Showing results 1 — 15 out of 23,982 results