Cooperating security managers: Distributed intrusion detection systems

被引:5
|
作者
White, G [1 ]
Pooch, V [1 ]
机构
[1] TEXAS A&M UNIV,DEPT COMP SCI,COLLEGE STN,TX 77843
关键词
intrusion detection; audit trail analysis; network security;
D O I
10.1016/0167-4048(96)00012-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems have been developed to address the break-in threat posed by ''hackers'' and the misuse threat posed by authorized users. Originally designed to address these threats as they apply to an individual host, the concept was eventually extended to a networked environment. Unfortunately the systems which have been implemented rely heavily on a centralized director or controller which coordinates the intrusion detection functions for the network. As the size of the network grows, the message-passing overhead associated with this approach can quickly saturate the centralized director resulting in performance degradation. This paper describes an approach to intrusion detection which places the intrusion detection responsibility for users on the host which the user first accesses. This approach results in a load leveling for messages across the network and avoids the chokepoint which exists with centralized controllers. The approach described is part of on-going computer security research bring conducted at Texas A&M University. Copyright (C) 1996 Elsevier Science Ltd.
引用
收藏
页码:441 / 450
页数:10
相关论文
共 50 条
  • [21] Security configuration management in Intrusion Detection and Prevention Systems
    Alsubhi, K.
    Alhazmi, Y.
    Bouabdallah, N.
    Boutaba, R.
    [J]. International Journal of Security and Networks, 2012, 7 (01) : 30 - 39
  • [22] Cyber Security Analysis and Evaluation for Intrusion Detection Systems
    Abushark, Yoosef B.
    Khan, Asif Irshad
    Alsolami, Fawaz
    Almalawi, Abdulmohsen
    Alam, Md Mottahir
    Agrawal, Alka
    Kumar, Rajeev
    Khan, Raees Ahmad
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1765 - 1783
  • [23] Intrusion Detection and Prevention Systems (IDPS) and Security Issues
    Sharifi, A. Ahmad
    Noorollahi, B. Akram
    Farokhmanesh, Farnoosh
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (11): : 80 - 84
  • [24] Intrusion detection systems for RPL security: A comparative analysis
    Simoglou, George
    Violettas, George
    Petridou, Sophia
    Mamatas, Lefteris
    [J]. COMPUTERS & SECURITY, 2021, 104
  • [25] Study of Intrusion Detection Systems (IDSs) in Network Security
    Wu Junqi
    Hu Zhengbing
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4532 - +
  • [26] INTRUSION DETECTION - AN APPLICATION OF EXPERT SYSTEMS TO COMPUTER SECURITY
    BAUER, DS
    EICHELMAN, FR
    HERRERA, RM
    IRGON, AE
    [J]. 1989 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 1989, : 97 - 100
  • [27] A review on intrusion detection approaches in cloud security systems
    Singh, Satyapal
    Kubendiran, Mohan
    Sangaiah, Arun Kumar
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2019, 10 (04) : 361 - 374
  • [28] The case for collaborative distributed wireless intrusion detection systems
    Beyah, Raheem A.
    Corbett, Cherita L.
    Copeland, John A.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 782 - +
  • [29] INTELLIGENT AGENTS FOR INTRUSION DETECTION IN DISTRIBUTED COMPUTER SYSTEMS
    Walkowiak, Tomasz
    Parazel, Artur
    Mazurkiewicz, Jacek
    [J]. MENDELL 2009, 2009, : 322 - 327
  • [30] Mobile agents community for distributed intrusion detection systems
    Benattou, M.
    Tamine, K.
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, PROCEEDINGS, 2005, : 347 - 351