Defusing Intrusion Capabilities by Collaborative Anomalous Trust Management

被引:1
|
作者
Abuosba, Khalil [1 ]
Martin, Clemens [1 ]
机构
[1] Univ Ontario, Philadelphia Univ, Inst Technol, Toronto, ON, Canada
关键词
D O I
10.1109/WETICE.2008.32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
From a computer security perspective, services provided by distributed information systems may be organized based on their security attributes goals and requirements; these processes and services are categorized as anonymous, registered, encrypted and trusted. In this research, we propose a solution for operational trust assurance problems where vulnerabilities reduction is implicitly observed. Collaborative Anomalous Trust Management (CATM) is a methodology that may be utilized for the purpose of affirming trust between communications endpoints. In conjunction with Trusted Computing Base, Zero Knowledge Protocol, and Layered Trust, CATM is defined. CATM builds its trust credentials based on computing environment variables. Ideally this methodology is suited for Service Oriented Architectures such as web services where set-vice providers and consumers interact at different levels of security requirements. This methodology is best optimized for use as a risk management utility. In this approach vulnerabilities are implicitly reduced, hence intrusion capabilities are defused
引用
收藏
页码:263 / 268
页数:6
相关论文
共 50 条
  • [1] Robust and Scalable Trust Management for Collaborative Intrusion Detection
    Fung, Carol J.
    Zhang, Jie
    Aib, Issam
    Boutaba, Raouf
    [J]. 2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009) VOLS 1 AND 2, 2009, : 33 - 40
  • [2] Trust Management for Host-Based Collaborative Intrusion Detection
    Fung, Carol J.
    Baysal, Olga
    Zhang, Jie
    Aib, Issarn
    Boutaba, Raouf
    [J]. MANAGING LARGE-SCALE SERVICE DEPLOYMENT, PROCEEDINGS, 2008, 5273 : 109 - 122
  • [3] Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
    Fung, Carol
    Zhang, Jie
    Aib, Issam
    Boutaba, Raouf
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2011, 19 (02) : 257 - 277
  • [4] Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
    Carol Fung
    Jie Zhang
    Issam Aib
    Raouf Boutaba
    [J]. Journal of Network and Systems Management, 2011, 19 : 257 - 277
  • [5] RECLAMO: Virtual and Collaborative Honeynets based on Trust Management and Autonomous Systems applied to Intrusion Management
    Gil Perez, Manuel
    Mateos Lanchas, Veronica
    Fernandez Cambronero, David
    Martinez Perez, Gregorio
    Villagra, Victor A.
    [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS), 2013, : 219 - 227
  • [6] Collaborative trust aware intelligent intrusion detection in VANETs
    Kumar, Neeraj
    Chilamkurti, Naveen
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1981 - 1996
  • [7] Towards Collaborative Trust Management
    Salah, Hisham
    Eltoweissy, Mohamad
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 198 - 208
  • [8] On Blockchain Architectures for Trust-based Collaborative Intrusion Detection
    Kolokotronis, Nicholas
    Brotsis, Sotirios
    Germanos, Georgios
    Vassilakis, Costas
    Shiaeles, Stavros
    [J]. 2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 21 - 28
  • [9] Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model
    Li, Wenjuan
    Meng, Weizhi
    Kwok, Lam-For
    Ip, Horace H. S.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 135 - 145
  • [10] Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges
    Li, Wenjuan
    Meng, Yuxin
    Kwok, Lam-For
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 518 - 522