Intrusion detection for distributed applications

被引:24
|
作者
Stillerman, M [1 ]
Marceau, C [1 ]
Stillman, M [1 ]
机构
[1] Odyssey Res Associates, Ithaca, NY 14850 USA
关键词
D O I
10.1145/306549.306577
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A distributed application is vulnerable to attack code masquerading as one of the components. An application that has been trained to recognize "itself" can reject such imposters.
引用
收藏
页码:62 / 69
页数:8
相关论文
共 50 条
  • [1] An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications
    Lanoe, David
    Hurfin, Michel
    Totel, Eric
    Maziero, Carlos
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 49 - 63
  • [2] An efficient distributed intrusion detection scheme
    Holz, T
    PROCEEDINGS OF THE 28TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATION CONFERENCE, WORKSHOP AND FAST ABSTRACTS, 2004, : 39 - 40
  • [3] Research on distributed intrusion detection system
    Wang, Zeng-Quan
    Wang, Hui-Qiang
    Zhao, Qian
    Zhang, Rui-Jie
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 181 - +
  • [4] Distributed Firewall with Intrusion Detection System
    Xie, Linquan
    Yu, Fei
    Xu, Chen
    JOURNAL OF COMPUTERS, 2012, 7 (12) : 3110 - 3115
  • [5] MODEL OF DISTRIBUTED INTRUSION DETECTION SYSTEM
    Trifonov, Vencisalv
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2010, 2 (02): : 67 - 72
  • [6] Unreliable intrusion detection in distributed computations
    Malkhi, D
    Reiter, M
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 116 - 124
  • [7] A distributed autonomous intrusion detection framework
    Cai, Yu
    2007 IEEE GLOBECOM WORKSHOPS, PROCEEDINGS, 2007, : 126 - 130
  • [8] Multithreading Distributed Intrusion Detection System
    An, Zhiyuan
    Liu, Haiyan
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 942 - 946
  • [9] Distributed and collaborative intrusion detection systems
    Farroukh, Amer
    Mukadam, Nabil
    Bassil, Elie
    Elhajj, Imad H.
    2008 IEEE LEBANON COMMUNICATIONS WORKSHOP, 2008, : 41 - 45
  • [10] Distributed intrusion detection based on clustering
    Zhang, YF
    Xiong, ZY
    Wang, XQ
    Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2379 - 2383