Cooperating security managers: Distributed intrusion detection systems

被引:5
|
作者
White, G [1 ]
Pooch, V [1 ]
机构
[1] TEXAS A&M UNIV,DEPT COMP SCI,COLLEGE STN,TX 77843
关键词
intrusion detection; audit trail analysis; network security;
D O I
10.1016/0167-4048(96)00012-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems have been developed to address the break-in threat posed by ''hackers'' and the misuse threat posed by authorized users. Originally designed to address these threats as they apply to an individual host, the concept was eventually extended to a networked environment. Unfortunately the systems which have been implemented rely heavily on a centralized director or controller which coordinates the intrusion detection functions for the network. As the size of the network grows, the message-passing overhead associated with this approach can quickly saturate the centralized director resulting in performance degradation. This paper describes an approach to intrusion detection which places the intrusion detection responsibility for users on the host which the user first accesses. This approach results in a load leveling for messages across the network and avoids the chokepoint which exists with centralized controllers. The approach described is part of on-going computer security research bring conducted at Texas A&M University. Copyright (C) 1996 Elsevier Science Ltd.
引用
收藏
页码:441 / 450
页数:10
相关论文
共 50 条
  • [1] Cooperating security managers: Distributed intrusion detection systems
    White, Gregory
    Pooch, Vdo
    [J]. Computers and Security, 15 (05): : 441 - 450
  • [2] Cooperating security managers: A peer-based intrusion detection system
    White, GB
    Fisch, EA
    Pooch, UW
    [J]. IEEE NETWORK, 1996, 10 (01): : 20 - 23
  • [3] Cooperating security managers: a peer-based intrusion detection system
    U.S. Air Force Acad, United States
    [J]. IEEE Network, 1 (20-23):
  • [4] Cooperating systems for global intrusion detection and tolerance
    Meddeb-Makhlouf, Amel
    Djemaiel, Yacine
    Boudriga, Noureddine
    [J]. 41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 235 - 242
  • [5] An Architecture of a Distributed Intrusion Detection System Using Cooperating Agents
    Sen, Jaydip
    Sengupta, Indranil
    Chowdhury, Piyali Roy
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS (ICOCI 2006), 2006, : 17 - +
  • [6] Modeling requests among cooperating intrusion detection systems
    Ning, P
    Wang, XS
    Jajodia, S
    [J]. COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1702 - 1715
  • [7] Distributed Intrusion Detection Systems for enhancing security in mobile Wireless Sensor Networks
    Mostarda, Leonardo
    Navarra, Alfredo
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2008, 4 (02) : 83 - 109
  • [8] Distributed and collaborative intrusion detection systems
    Farroukh, Amer
    Mukadam, Nabil
    Bassil, Elie
    Elhajj, Imad H.
    [J]. 2008 IEEE LEBANON COMMUNICATIONS WORKSHOP, 2008, : 41 - 45
  • [9] Intrusion detection and security policy framework for distributed environments
    El Kalam, AA
    Briffaut, J
    Toinard, C
    Blanc, M
    [J]. 2005 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS, 2005, : 100 - 105
  • [10] DEVS simulation of distributed intrusion detection systems
    Cho, Tae Ho
    Kim, Hyung Jong
    [J]. Transactions of the Society for Computer Simulation, 2002, 18 (03): : 133 - 146