Policy-Based Security Configuration Management Application to Intrusion Detection and Prevention

被引:0
|
作者
Alsubhi, Khalid [1 ]
Aib, Issam [1 ]
Francois, Jerome [2 ]
Boutaba, Raouf [1 ]
机构
[1] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
[2] MADYNES, INRIA Lorraine, CNRS, Nancy, France
基金
加拿大自然科学与工程研究理事会;
关键词
Security management policies; Security Configuration; Risk Management; Alert Management;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of an enterprise information system. IDPSes can be network or host-based and can collaborate in order to provide better detections of malicious traffic. Although several IDPS systems have been proposed, their appropriate configuration and control for effective detection and prevention of attacks has always been far from trivial. Another concern is related to the slowing down of system performance when maximum security is applied, hence the need to trade off between security enforcement levels and the performance and usability of an enterprise information system. In this paper we motivate the need for and present a policy-based framework for the configuration and control of the security enforcement mechanisms of an enterprise information system. The approach is based on dynamic adaptation of security measures based on the assessment of system vulnerability and threat prediction and provides several levels of attack containment. As an application, we have implemented a dynamic policy-based adaptation mechanism between the Snort signature-based IDPS and the light weight anomaly-based Fire Collaborator IDS. Experiments conducted over the DARPA 2000 and 1999 intrusion detection evaluation datasets show the viability of our framework.
引用
收藏
页码:1051 / +
页数:2
相关论文
共 50 条
  • [41] Policy-Based Intrusion Detection in Web Applications by Monitoring Java']Java Information Flows
    Hiet, Guillaume
    Tong, Valerie Viet Triem
    Me, Ludovic
    Morin, Benjamin
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 53 - 60
  • [42] Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems
    Cai, Chuanxi
    Mei, Shue
    Zhong, Weijun
    INFORMATION TECHNOLOGY & MANAGEMENT, 2019, 20 (02): : 55 - 71
  • [43] Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems
    Chuanxi Cai
    Shue Mei
    Weijun Zhong
    Information Technology and Management, 2019, 20 : 55 - 71
  • [44] Intrusion detection: Introduction to intrusion detection and security information management
    Debar, H
    Viinikka, J
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 207 - 236
  • [45] SmartSSL: Efficient policy-based web security
    Gaspard, Camille
    Haidar, Batoul
    Kayssi, Ayman
    Chehab, Ali
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 833 - +
  • [46] Analysis of Policy-Based Security Management System in Software-Defined Networks
    Sood, Keshav
    Karmakar, Kallol Krishna
    Varadharajan, Vijay
    Tupakula, Uday
    Yu, Shui
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (04) : 612 - 615
  • [47] A policy-based security model for web system
    Xie, WX
    Ma, HD
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 187 - 191
  • [48] A Policy-based Dynamic Security Management Mechanism for MIPv6 Networks
    Gao, Tianhan
    Guo, Nan
    Zhu, Zhiliang
    ICWMMN 08, PROCEEDINGS, 2008, : 110 - 113
  • [49] Verifying Policy-Based Web Services Security
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Gordon, Andrew D.
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 30 (06):
  • [50] Policy-Based Security Management System for 5G Heterogeneous Networks
    Alquhayz, Hani
    Alalwan, Nasser
    Alzahrani, Ahmed Ibrahim
    Al-Bayatti, Ali H.
    Sharif, Mhd Saeed
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019