An intrusion-tolerant mechanism for intrusion detection systems

被引:2
|
作者
Kuang, Liwei [1 ]
Zulkernine, Mohammad [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON K7L 3N6, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1109/ARES.2008.68
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In accordance with the increasing importance of intrusion detection systems (IDS), users justifiably demand the trustworthiness of the IDS. However, sophisticated attackers attempt to disable the IDS before they launch a thorough attack. Therefore, to accomplish its function, an IDS should have some mechanism to guarantee uninterrupted detection service even in the face of IDS component failures due to attacks. In this paper, we propose an intrusion-tolerant mechanism for network intrusion detection systems (NIDS) that employ multiple independent components. The mechanism monitors the detection units and the hosts on which the units reside and enables the IDS to survive component failure due to intrusions. As soon as a failed IDS component is discovered, a copy of the component is installed to replace it and the detection service continues. We implement the intrusion-tolerant mechanism based on the CSI-KNN-based NIDS and evaluate the prototype in the face of component failures. The results demonstrate that the mechanism can effectively tolerate intrusions.
引用
收藏
页码:319 / +
页数:2
相关论文
共 50 条
  • [1] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [2] Intrusion-tolerant enclaves
    Dutertre, B
    Crettaz, V
    Stavridou, V
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
  • [3] Evaluating Intrusion-Tolerant Certification Authority Systems
    Lin, Jingqiang
    Jing, Jiwu
    Liu, Peng
    [J]. QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2012, 28 (08) : 825 - 841
  • [4] DiveInto: Supporting Diversity in Intrusion-Tolerant Systems
    Antunes, Joao
    Neves, Nuno
    [J]. 2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2011, : 137 - 146
  • [5] On the effects of finite memory on intrusion-tolerant systems
    Veronese, Giuliana Santos
    Correia, Miguel
    Lung, Lau Cheuk
    Verissimo, Paulo
    [J]. 13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 401 - 404
  • [6] Intrusion-Tolerant Autonomous Driving
    Volp, Marcus
    Esteves-Verissimo, Paulo
    [J]. 2018 IEEE 21ST INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2018), 2018, : 130 - 133
  • [7] Practical Intrusion-Tolerant Networks
    Obenshain, Daniel
    Tantillo, Thomas
    Babay, Amy
    Schultz, John
    Newell, Andrew
    Hoque, Md. Endadul
    Amir, Yair
    Nita-Rotaru, Cristina
    [J]. PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 45 - 56
  • [8] Availability analysis and comparison of different intrusion-tolerant systems
    Wang, C
    Ma, JF
    [J]. CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 161 - 166
  • [9] Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems
    Heo, Seondong
    Lee, Soojin
    Jang, Bumsoon
    Yoon, Hyunsoo
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (01): : 118 - 129
  • [10] An intrusion-tolerant intrusion detection method based on real-time sequence analysis
    Zhao, Feng
    Li, Qing-Hua
    Jin, Li
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2692 - +