Network-based intrusion has become a serious threat to networked information systems. Yet, the current network security mechanisms are passive in response to network-based intrusions. In order to hide their origins, i...
详细信息
ISBN:
(纸本)0769520332
Network-based intrusion has become a serious threat to networked information systems. Yet, the current network security mechanisms are passive in response to network-based intrusions. In order to hide their origins, intruders usually use incorrect or spoofed source IP addresses breaking into targets. It is difficult to identify the real source of these network-based intrusions due to the nature of the IP protocol. This paper presents the design of distributed intrusion source identification system (DISIS) based on agents. It is comprised of several agents of different types, which can be developed respectively. The agents communicate with each other when they take their actions. DISIS can cooperate with any other intrusion detection system. This system can be installed in router or a dedicated device connected to router. DISIS can trace single source attack or multiple sources attack on-line or off-line.
To address the need for highly configurable and customizable distributedsystems, researchers and practitioners are investigating various innovative approaches. One of the promising techniques emerging from this area ...
详细信息
ISBN:
(纸本)0769519210
To address the need for highly configurable and customizable distributedsystems, researchers and practitioners are investigating various innovative approaches. One of the promising techniques emerging from this area of study is mobile computing. In this paper we present an architecture-based approach to supporting distributed deployment and mobility of software systems. We exploit a connector-aware architectural middleware in providing these capabilities. The approach has been successfully tested on several applications for networks of small, mobile, resource constrained devices (e.g., hand-held computers).
As information technologies evolve, computing environments become more distributed, cooperated, and heterogeneous. More and more software applications written in different programming languages running on different pl...
详细信息
ISBN:
(纸本)0780379527
As information technologies evolve, computing environments become more distributed, cooperated, and heterogeneous. More and more software applications written in different programming languages running on different platforms with different operating systems are required to communicate with one another over different computernetworks in a collaborative manner. Conflicts resulting from having heterogeneous cooperated distributed computing environments require strategies for software interoperability. In this paper, we will present a 4-layered interconnection model to support the development of heterogeneous distributed coordinated reusable components. Each layer will have a collection of well-defined functions that access the layer below it by using its interface. The interconnection model decouples the applications and the underlying middleware implementations by isolating computation, communication, and coordination promotes reuse, improves comprehension, and eases maintenance due to software evolution.
Secure distribution of information to authorized recipients is an important prerequisite for group applications with commercial potential. Typically in such applications data traffic is encrypted using a single key;th...
详细信息
ISBN:
(纸本)0780379454
Secure distribution of information to authorized recipients is an important prerequisite for group applications with commercial potential. Typically in such applications data traffic is encrypted using a single key;that key in turn is distributed securely to the group using one of several mechanisms that rely on each member having a unique set of "key encryption" keys. As users join and leave the group, members' keysets have to be changed according to a rekey policy. The rekey policy is important because it determines the security properties provided to the application (e.g. forward/backward secrecy). In this paper we present a general model of rekey policies for large-scale applications, and use it to compare the effectiveness of policies proposed in the literature for various applications. Unlike prior work, which has focused on the cost of rekeying, our model also accounts for the cost of not rekeying. We cast existing policies in terms of our model and then propose a more flexible policy that we call exposure-oriented rekeying. We present simulation results showing that our new policy reduces the peak and variation in cost to achieve a given level of security, compared with periodic or batch-oriented rekeying policies.
As computersystems become more complex and more widely distributed, it is becoming increasingly difficult to remove all vulnerabilities that can potentially be exploited by intruders. Intrusion tolerance is an emergi...
详细信息
ISBN:
(纸本)0769519520
As computersystems become more complex and more widely distributed, it is becoming increasingly difficult to remove all vulnerabilities that can potentially be exploited by intruders. Intrusion tolerance is an emerging approach that aims to enable systems to continue functioning in spite of successful intrusions. Before intrusion tolerance is accepted! as an approach to security, there must be quantitative techniques to measure its, efficacy. However, there have been very few attempts at quantitative validation of intrusion-tolerant systems or, for that matter, of security in general. In this paper, we show that probabilistic validation through stochastic modeling is an attractive mechanism for evaluating intrusion tolerance. We demonstrate our approach by using stochastic activity networks to quantitativily validate an intrusion-tolerant replication management system. We characterize the intrusion tolerance provided, by the system through several measures defined on the model, and study variations in these measures in response to changes in system parameters to evaluate the relative merits of various design choices.
The proceedings contains 75 papers. Topics discussed include self-stabilizing systems, sensor networks and energy management, peer to peer services, distributed algorithms, multimedia streaming, secure data sharing, q...
详细信息
The proceedings contains 75 papers. Topics discussed include self-stabilizing systems, sensor networks and energy management, peer to peer services, distributed algorithms, multimedia streaming, secure data sharing, quality of service, internet protocols, middleware communication services, fault tolerant systems, ubiquitous computing, network security, real time systems, web servers, middleware and interoperability, formal methods, Ad hoc network protocols, peer to peer infrastructure, synchronization, wide area distributed computing, mobile agents, program/software analysis, wireless access control and scalable data services.
We show how a recent language for the description of cryptographic protocols in a real time setting may be suitable to formally verify security aspects of wireless protocols. We define also a compositional proof rule ...
详细信息
ISBN:
(纸本)3540204911
We show how a recent language for the description of cryptographic protocols in a real time setting may be suitable to formally verify security aspects of wireless protocols. We define also a compositional proof rule for establishing security properties;of such protocols. The effectiveness of our approach is shown by defining and studying the timed integrity property for muTESLA, a well-known protocol for wireless sensor networks. We are able to deal with protocol specifications with an arbitrary number of agents (senders as well as receivers) running the protocol.
In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing techniques such as passive participat...
详细信息
ISBN:
(纸本)1581137079
In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing techniques such as passive participation. LEAP includes support for multiple symmetric keying mechanisms including individual keys, pairwise shared keys, cluster keys, and a group key. This design is based on the observation that different types of messages exchanged between sensor nodes have different security requirements, and a single keying mechanism is not suitable for meeting these different security requirements.
In this paper we investigate the survivability of multi-level ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishing security policies. We identify vari...
详细信息
ISBN:
(纸本)0769519210
In this paper we investigate the survivability of multi-level ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishing security policies. We identify various issues in group formation and evolution. We define components and rules of direct trust and trust recommendation. We then apply them in constructing functioning groups. We also propose some policy guidelines for addressing these issues.
Super-worms constitute the most advanced and dangerous threat for networks and the whole Internet. Their goal is to infect the significant majority of Internet hosts in the minimum possible time, by using advanced tec...
详细信息
ISBN:
(纸本)0769519210
Super-worms constitute the most advanced and dangerous threat for networks and the whole Internet. Their goal is to infect the significant majority of Internet hosts in the minimum possible time, by using advanced techniques to partition the Internet address space and to coordinate the infection process. In this paper, we present Pulse, a new class of super-worms, which target network systems and specifically routers, in contrast to conventional worms and super-worms which target network hosts. Pulse super-worms can be very effective and efficient, because they exploit one significant Internet vulnerability: the assumption of Internet's development model that all routers are trustworthy and can coordinate to defend against attacks from external enemies, who have been considered the only enemies traditionally. Pulse super-worms infect routers, thus creating internal enemies undefeatable using the existing security model. As we demonstrate, Pulse super-worms are more efficient than alternatives in infecting network systems and utilize available information for self-organizing their infection policy. Furthermore, we demonstrate through specific attack scenarios, that Pulse super-worms can be extremely effective for a wide range of attacks, especially in information warfare. Finally, we describe countermeasures which are necessary for a successful defense against Pulse super-worms.
暂无评论