Policy-Based Security Configuration Management Application to Intrusion Detection and Prevention

被引:0
|
作者
Alsubhi, Khalid [1 ]
Aib, Issam [1 ]
Francois, Jerome [2 ]
Boutaba, Raouf [1 ]
机构
[1] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
[2] MADYNES, INRIA Lorraine, CNRS, Nancy, France
基金
加拿大自然科学与工程研究理事会;
关键词
Security management policies; Security Configuration; Risk Management; Alert Management;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of an enterprise information system. IDPSes can be network or host-based and can collaborate in order to provide better detections of malicious traffic. Although several IDPS systems have been proposed, their appropriate configuration and control for effective detection and prevention of attacks has always been far from trivial. Another concern is related to the slowing down of system performance when maximum security is applied, hence the need to trade off between security enforcement levels and the performance and usability of an enterprise information system. In this paper we motivate the need for and present a policy-based framework for the configuration and control of the security enforcement mechanisms of an enterprise information system. The approach is based on dynamic adaptation of security measures based on the assessment of system vulnerability and threat prediction and provides several levels of attack containment. As an application, we have implemented a dynamic policy-based adaptation mechanism between the Snort signature-based IDPS and the light weight anomaly-based Fire Collaborator IDS. Experiments conducted over the DARPA 2000 and 1999 intrusion detection evaluation datasets show the viability of our framework.
引用
收藏
页码:1051 / +
页数:2
相关论文
共 50 条
  • [1] Design of policy-based security management for intrusion detection
    Jo, SH
    Kim, JN
    Soh, SW
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 337 - 340
  • [2] Security configuration management in Intrusion Detection and Prevention Systems
    Alsubhi, K.
    Alhazmi, Y.
    Bouabdallah, N.
    Boutaba, R.
    International Journal of Security and Networks, 2012, 7 (01) : 30 - 39
  • [3] Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy
    George, Laurent
    Tong, Valerie Viet Triem
    Me, Ludovic
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 355 - 356
  • [4] Security checker architecture for policy-based security management
    Tishkov, A
    Kotenko, I
    Sidelnikova, E
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 460 - 465
  • [5] A security policy and Network Cartography based Intrusion Detection and Prevention Systems
    Meharouech, Sourour
    Bouhoula, Adel
    Abbes, Tarek
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 279 - 291
  • [6] A proposal of protocol and policy-based intrusion detection system
    Baba, T
    Matsuda, S
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL, III, PROCEEDINGS: COMMUNICATION, NETWORK AND CONTROL SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2003, : 365 - 370
  • [7] Accurate and automated system call policy-based intrusion prevention
    Lam, Lap Chung
    Li, Wei
    Chiueh, Tzi-cker
    DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 413 - 422
  • [8] User isolation and policy-based security management
    Rayes, MA
    Cheung, M
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 75 - 79
  • [9] POSITIF: a policy-based security management system
    Basile, Cataldo
    Lioy, Antonio
    Perez, Gregorio Martinez
    Garcia Clemente, Felix J.
    Skarmeta, Antonio F. Gomez
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 280 - 280
  • [10] Policy management for network-based intrusion detection and prevention
    Chen, YM
    Yang, YY
    NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, APPLICATION SESSIONS: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 219 - 232