Preview

Spss Tutorial

Better Essays
Open Document
Open Document
15972 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Spss Tutorial
CHAPTER

Intrusion Response Systems: A Survey

10

10.1 INTRODUCTION
The occurrence of outages due to failures in today’s information technology infrastructure is a real problem that still begs a satisfactory solution. The backbone of the ubiquitous information technology infrastructure is formed by distributed systems—distributed middleware, such as CORBA and DCOM; distributed file systems, such as NFS and XFS; distributed coordination-based systems, such as publish-subscribe systems and network protocols; and above all, the distributed infrastructure of the World Wide Web. Distributed systems support many critical applications in the civilian and military domains. Critical civilian applications abound in private enterprise, such as banking, electronic commerce, and industrial control systems, as well as in the public enterprise, such as air traffic control, nuclear power plants, and protection of public infrastructures through Supervisory Control and Data Acquisition (SCADA) systems. The dependency dramatically magnifies the consequence of failures, even if transient. There is little wonder that distributed systems, therefore, are called upon to provide alwaysavailable and trustworthy services. The terminology that we will use in this chapter is to consider the distributed systems as composed of multiple services and the services interact with one another through standardized network protocols. Consider, for example, a distributed e-commerce system with the traditional threetier architecture of a web server, application server, and database server. The services are typically located on multiple hosts. The importance of distributed systems has led to a long interest in securing such systems through prevention and runtime detection of intrusions. The prevention is traditionally achieved by a system for user authentication and identification (e.g., users log in by providing some identifying information such as log-in signature and password, biometric information,



References: 341 [13] W. Lee, W. Fan, M. Miller, S. J. Stolfo, and E. Zadok, “Toward Cost-Sensitive Modeling for Intrusion Detection and Response,” Journal of Computer Security, 10:5–22, 2002. [14] D. Wang, B. B. Madan, and K. S. Trivedi, “Security Analysis of SITAR Intrusion Tolerance System,” Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, Fairfax, VA, 2003, pp. 23–32. [15] C. Cachin,“Distributing Trust on the Internet,” Proceedings of the International Conference on Dependable Systems and Networks (DSN), Göteborg, Sweden, 2001, pp. 183–192. [16] P. Pal, F. Webber, and R. Schantz, “Survival by Defense-Enabling,” in Jaynarayan H. Lala (Ed.), Foundations of Intrusion Tolerant Systems (Organically Assured and Survivable Information Systems). Los Alamitos, CA: IEEE Computer Society, 2003, pp. 261–269. [17] F. B. Schneider and L. Zhou, “Implementing Trustworthy Services Using Replicated State Machines,” Security & Privacy Magazine, IEEE, 3:34–43, 2005. [18] M. A. Hiltunen, R. D. Schlichting, and C. A. Ugarte, “Building Survivable Services Using Redundancy and Adaptation,” IEEE Transactions on Computers, 52:181–194, 2003. [19] D. Sterne, K. Djahandari, B. Wilson, B. Babson, D. Schnackenberg, H. Holliday, and T. Reid, “Autonomic Response to Distributed Denial of Service Attacks,” Proceedings of the 4th International Symposium on Rapid Advances in Intrusion Detection (RAID), Davis, CA, 2001, pp. 134–149. [20] C. Douligeris and A. Mitrokotsa, “DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art,” Computer Networks, 44:643–666, 2004. [21] G. Koutepas, F. Stamatelopoulos, and B. Maglaris, “Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks,” Journal of Network and Systems Management, 12:73–94, 2004. [22] University of Southern California, Information Sciences Institute, “Generic Authorization and Access-control API (GAA-API),” at http://gost.isi.edu/info/gaaapi/. [23] Netfilter Core Team, “Libipq—Iptables Userspace Packet Queuing Library,” at http://www .cs.princeton.edu/~nakao/libipq.htm. [24] McAfee Inc.,“Network Intrusion Prevention,” at http://www.mcafee.com/us/smb/products/ network_intrusion_prevention/index.html. [25] McAfee Inc., “McAfee Host Intrusion Prevention,” at http://www.mcafee.com/us/local_ content/datasheets/partners/ds_hips.pdf. [26] B. Foo, Y. S. Wu, Y. C. Mao, S. Bagchi, and E. Spafford, “ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-commerce Environment,” Proceedings of the International Conference on Dependable Systems and Networks (DSN), Yokohama, Japan, 2005, pp. 508–517. [27] Y. Wu, B. Foo, Y. Mao, S. Bagchi, and E. H. Spafford,“Automated Adaptive Intrusion Containment in Systems of Interacting Services,” Elsevier Computer Networks Journal, Special Issue on “From Intrusion Detection to Self-Protection,” 51(5):1334–1360, April 2007. [28] D. Armstrong, S. Carter, G. Frazier, and T. Frazier, “Autonomic Defense: Thwarting Automated Attacks via Real-Time Feedback control,” Wiley Complexity, 9:41–48, 2003. [29] D. Armstrong, G. Frazier, S. Carter, T. Frazier, and I. Alphatech,“A Controller-Based Autonomic Defense System,”Proceedings of the DARPA Information Survivability Conference and Exposition, Washington, DC, 2003, vol. 2, pp. 21–23. [30] O. P. Kreidl and T. M. Frazier, “Feedback Control Applied to Survivability: A Host-Based Autonomic Defense System,” IEEE Transactions on Reliability, 53:148–166, 2004. 342 CHAPTER 10 Intrusion Response Systems: A Survey [31] P. A. Porras and P. G. Neumann, “EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances,”Proceedings of the National Information Systems Security Conference, Baltimore, MD, 1997, pp. 353–365. [32] P. Porras, D. Schnackenberg, S. Staniford-Chen, M. Stillman, and F. Wu, “The Common Intrusion Detection Framework,” CIDF working group document, at http://www.gidos.org. [33] M. Petkac and L. Badger, “Security Agility in Response to Intrusion Detection,” Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, 2000, pp. 11–20. [34] P. P. Pal, F. Webber, R. E. Schantz, and J. P. Loyall, “Intrusion Tolerant Systems,”Proceedings of the IEEE Information Survivability Workshop (ISW-2000), Boston, MA, 2000, pp. 24–26. [35] V. Stavridou, B. Dutertre, R. A. Riemenschneider, and H. Saidi, “Intrusion Tolerant Software Architectures,”Proceedings of the 2001 DARPA Information Survivability Conference & Exposition, 2001, pp. 230–241. [36] S. M. Khattab, C. Sangpachatanaruk, D. Mosse, R. Melhem, and T. Znati, “Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks,” Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS), 2004, pp. 328–337. [37] W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, and R. M. Jokerst, “Analyzing Interaction between Distributed Denial of Service Attacks and Mitigation Technologies,” Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX), 2003, vol. 1, pp. 26–36. [38] D. K. Y. Yau, J. C. S. Lui, L. Feng, and Y. Yeung,“Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles,” IEEE/ACM Transactions on Networking, 13:29–42, 2005. [39] D. Schnackenberg, K. Djahandari, and D. Sterne, “Infrastructure for Intrusion Detection and Response,”Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), 2000, vol. 2, pp. 3–11. [40] Carnegie Mellon University, Software Engineering Institute, “Survivable Network Technology,” at http://www.sei.cmu.edu/organization/programs/nss/surv-net-tech.html. [41] R. J. Ellison, R. C. Linger, T. Longstaff, and N. R. Mead, “Survivable Network System Analysis: A Case Study,” IEEE Software, 16(4): 70–77, Jul./Aug. 1999. [42] S. Jha, J. Wing, R. Linger, and T. Longstaff, “Survivability Analysis of Network Specifications,” Proceedings of International Conference on Dependable Systems and Networks (DSN), New York, NY, 2000, pp. 613–622. [43] J. R. Horgan, S. London, and M. R. Lyu, “Achieving Software Quality with Testing Coverage Measures,” Computer, 27:60–69, 1994. [44] Devellion Limited,“CubeCart: PHP and MySQL Shopping Cart,” at http://www.cubecart.com/. [45] V. Srinivasan, G. Varghese, and S. Suri, “Packet Classification Using Tuple Space Search,” Proceedings of ACM SIGCOMM, Sept. 1999, pp. 135–146. [46] M. Waldvogel, G. Varghese, J. Turner, and B. Plattner, “Scalable High Speed IP Routing Lookups,” Proceedings of ACM SIGCOMM, Sept. 1997, pp. 25–36. [47] P. Gupta and N. McKeown, “Algorithms for Packet Classification,” IEEE Network, 15(2): 24–32, 2001. [48] P. Gupta and N. McKeown, “Packet Classification Using Hierarchical Intelligent Cuttings,” Hot Interconnects VII, Aug. 1999. [49] P. Gupta, S. Lin, and N. McKeown,“Routing Lookups in Hardware at Memory Access Speeds,” Proceedings of IEEE INFOCOM, 8:1240–1247, Mar. 1999.

You May Also Find These Documents Helpful

  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Bradley, Tony, (2012). Introduction to Intrusion Detections Systems (IDS). Retrieved September 5, 2012 from http://netsecurity.about.com/cs/hackertools/a/aa030504.htm…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    INDP Final Project

    • 1793 Words
    • 4 Pages

    References: Banathy, A., Panozzo, G., Gordy, A., & Senese, J. (2013, July). A Layered Approach to Network Security. Retrieved from http://www.industrial-ip.org/en/knowledge-center/solutions/security-and-compliance/a-layered-approach-to-network-security…

    • 1793 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    This guide is meant to describe best practices for the detection and prevention of denial of service attacks, such as the event that recently occurred at the university. It was determined that based on current security guidelines and current controls in place, the university was still severely vulnerable from an internal aspect and all identified gaps need to be addressed and resolved. Each control described below will provide a more in depth look at the overall strategy of how a network should be protected but still allow for the functionality that is required to maintain normal operations.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    There are two kinds of systems that people can utilize when setting up a network. They can use a distributed system or the other kind of system called a centralized system. In this paper we will find out what can happen as far as the failures in these systems and what if anything can be done to fix these systems when they fail.…

    • 726 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Better Essays

    [Company] has been contracted to conduct a penetration test against [Organization] external web presence. The…

    • 1355 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Global Finance, Inc. (GFI) is a hypothetical company, which has grown rapidly over the past year. GFI has invested in its network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth. The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The most vital application servers is the company is their Oracle database and email system. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has recently experienced multiple network attacks resulting in a total estimated loss at more than $1,000,000.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The signature based technique is easier for deployment, since it does not need to learn the environment[5]. It is very effective against known attacks, but it cannot detect new intrusions until it is updated with the new signatures on its database.Therefore, they are easy to evade and can be easily bypassed by intruders by modifying known attack signatures and also target systems, that are not updated with new signatures that detect the modification. The architecture shown in Fig.1, uses the preprocessing to evaluate the signature and compare those signatures to the known signatures in the database. If there is a match then alert is issued, else the detection system does…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    554 Infrastructure

    • 3120 Words
    • 13 Pages

    Iniewski, K., McCrosky, C., & Minoli, D. (2008). Network infrastructure and architecture: Designing high-availability networks. Hoboken, NJ: Wiley-Interscience.…

    • 3120 Words
    • 13 Pages
    Best Essays

Related Topics