Distributed Tracing of Intruders

Distributed Tracing of Intruders PDF Author: Stuart Gresley Staniford-Chen
Publisher:
ISBN:
Category :
Languages : en
Pages : 178

Get Book Here

Book Description
Unwelcome intrusions into computer systems are being perpetrated by strangers, and the number of such incidents is rising steadily. One of the things that facilitates this malfeasance is that computer networks provide the ability for a user to log into multiple computer systems in sequence, changing identity with each step. This makes it very difficult to trace actions on a network of computers all the way back to their actual origins. We refer to this as the tracing problem. This thesis attempts to address this problem by the development of a technology called thumbprinting. Thumbprinting involves forming a signature of the data in a network connection. This signature is a small quantity which does not allow complete reconstruction of the data, but does allow comparison with signatures of other connections to determine with reasonable confidence whether the data were the same or not. This is a potential basis for a tracing system. The specific technology developed to perform this task is local thumbprinting. This involves forming linear combinations of the frequencies with which different characters occur in the network data sampled. The optimal linear combinations are chosen using a statistical methodology called principal component analysis. The difficulties which this process must overcome are outlined, and an algorithm for comparing the thumbprints which adaptively handles these difficulties is presented. A number of experiments with a trial implementation of this method are described. The method is shown to work successfully when given at least a minute and a half of reasonably active network connection. This requires presently about 20 bytes per minute per connection of storage for the thumbprints. In addition, the existing (very limited) literature on the tracing problem is reviewed.

Distributed Tracing of Intruders

Distributed Tracing of Intruders PDF Author: Stuart Gresley Staniford-Chen
Publisher:
ISBN:
Category :
Languages : en
Pages : 178

Get Book Here

Book Description
Unwelcome intrusions into computer systems are being perpetrated by strangers, and the number of such incidents is rising steadily. One of the things that facilitates this malfeasance is that computer networks provide the ability for a user to log into multiple computer systems in sequence, changing identity with each step. This makes it very difficult to trace actions on a network of computers all the way back to their actual origins. We refer to this as the tracing problem. This thesis attempts to address this problem by the development of a technology called thumbprinting. Thumbprinting involves forming a signature of the data in a network connection. This signature is a small quantity which does not allow complete reconstruction of the data, but does allow comparison with signatures of other connections to determine with reasonable confidence whether the data were the same or not. This is a potential basis for a tracing system. The specific technology developed to perform this task is local thumbprinting. This involves forming linear combinations of the frequencies with which different characters occur in the network data sampled. The optimal linear combinations are chosen using a statistical methodology called principal component analysis. The difficulties which this process must overcome are outlined, and an algorithm for comparing the thumbprints which adaptively handles these difficulties is presented. A number of experiments with a trial implementation of this method are described. The method is shown to work successfully when given at least a minute and a half of reasonably active network connection. This requires presently about 20 bytes per minute per connection of storage for the thumbprints. In addition, the existing (very limited) literature on the tracing problem is reviewed.

Information Security

Information Security PDF Author: Agnes Hui Chan
Publisher: Springer
ISBN: 3540458115
Category : Computers
Languages : en
Pages : 512

Get Book Here

Book Description
As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas. The conference is an outgrowth of the Information Security Workshop, first held in Ishikawa, Japan 1997. ISC 2002 was held in Sao Paulo, Brazil, on September 30– October 2, 2002. The Program Committee considered 81 submissions of which 38 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. The papers provide a representative sample of both the variety and the truly international scope of information security research conducted currently. The topics addressed range from e-commerce protocols to access control and trust management, and to cryptography and cryptographic algorithms. Many people deserve our gratitude for their contribution to the success of the conference. We would like to thank the General Chair, Routo Terada, for overseeing the local arrangements, including registration and maintaining the conference website, and for the smooth running of the conference. We are grateful to Robbie Ye for his expert help in processing the electronic submissions, reviews and acceptance notifications. Robbie’s enthusiasm and energy greatly simplified the Program Committee’s task of conducting the on-line evaluation of the submitted papers under tight time constraints.

Intrusion Detection in Distributed Systems

Intrusion Detection in Distributed Systems PDF Author: Peng Ning
Publisher: Springer Science & Business Media
ISBN: 1461504678
Category : Computers
Languages : en
Pages : 146

Get Book Here

Book Description
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Proceedings

Proceedings PDF Author:
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 172

Get Book Here

Book Description


Intrusion Detection

Intrusion Detection PDF Author: Edward G. Amoroso
Publisher:
ISBN: 9780966670073
Category : Computers
Languages : en
Pages : 224

Get Book Here

Book Description


Recent Advances in Intrusion Detection

Recent Advances in Intrusion Detection PDF Author: Christopher Kruegel
Publisher: Springer Science & Business Media
ISBN: 3540743197
Category : Business & Economics
Languages : en
Pages : 347

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection, RAID 2007, held in Gold Coast, Australia in September 2007. The 17 revised full papers presented were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.

Kubernetes Security and Observability

Kubernetes Security and Observability PDF Author: Brendan Creane
Publisher: "O'Reilly Media, Inc."
ISBN: 1098107071
Category : Computers
Languages : en
Pages : 195

Get Book Here

Book Description
Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for building and securing cloud native applications running on Kubernetes. Whether you're already working on cloud native applications or are in the process of migrating to its architecture, this guide introduces key security and observability concepts and best practices to help you unleash the power of cloud native applications. Authors Brendan Creane and Amit Gupta from Tigera take you through the full breadth of new cloud native approaches for establishing security and observability for applications running on Kubernetes. Learn why you need a security and observability strategy for cloud native applications and determine your scope of coverage Understand key concepts behind the book's security and observability approach Explore the technology choices available to support this strategy Discover how to share security responsibilities across multiple teams or roles Learn how to architect Kubernetes security and observability for multicloud and hybrid environments

Real Time Detection of Code

Real Time Detection of Code PDF Author: Banipal Shahbaz
Publisher:
ISBN:
Category :
Languages : en
Pages : 204

Get Book Here

Book Description


Parallel and Distributed Computing: Applications and Technologies

Parallel and Distributed Computing: Applications and Technologies PDF Author: K. M. Liew
Publisher: Springer Science & Business Media
ISBN: 3540240136
Category : Computers
Languages : en
Pages : 914

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 5th International Conference on Parallel and Distributed Computing, Applications and Technologies; PDCAT 2004, held in Singapore in December 2004. The 173 papers presented were carefully reviewed and selected from 242 submissions. The papers focus on parallel and distributed computing from the perspectives of algorithms, networking and architecture, software systems and technologies, and applications. Besides classical topics from high performance computing, major recent developments are addressed, such as molecular computing, date mining, knowledge discovery, optical networks, secure computing and communications, wireless networks, mobile computing, component-based systems, Internet computing, and Web Technologies.

Information Security

Information Security PDF Author:
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 528

Get Book Here

Book Description