skip to main content
10.1145/1244002.1244051acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Global intrusion detection and tolerance in networked systems

Published: 11 March 2007 Publication History

Abstract

This paper presents an architecture for a global intrusion detection and tolerance such as global detection, global correlation, and intrusion tolerance. Global Intrusion Detection and Tolerance System (GIDTS). The cooperation proposed by the GIDTS solution allows the detection of complex attacks at their early stages. This cooperation is performed based on the output of several detection components located at different levels (wire network, wireless network, host, and disk). In addition, major detection and tolerance capabilities are protected against intruders attempts since they are performed by compromise independent components, located at the disk level. The GIDTS components implement different functions based on formal models proposed in this paper including, especially, alert correlation, storage requests, and tolerance strategy models. To enhance detection and tolerance capabilities, each GIDTS is assumed to cooperate with any other GIDTSs via a neighbor identification protocol. To illustrate GIDTS behavior, we propose an environment that integrates the flight management system, which represents a distributed application.

References

[1]
C. J. Healey: P. Ning: D. Xu; and R. St. Amant, Building attack scenarios through integration of complementary alert correlation method, CIT05 (USA), 2004.
[2]
Y. Djemail; S. Rekhis; and N. Boudriga, Cooperative intrusion detection and tolerance system, ICECS, 2005.
[3]
S. T. King and P. M. Chen, Backtracking intrusions, ACM Transactions on Computer Systems, vol. 23(1):223--236, 2005.
[4]
V. Kumar, Parallel and distributed computing for cybersecurity, IEEE distributed systems online, vol. 6, 2006.

Index Terms

  1. Global intrusion detection and tolerance in networked systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
      March 2007
      1688 pages
      ISBN:1595934804
      DOI:10.1145/1244002
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 11 March 2007

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. disk-based intrusion detection
      2. distributed attacks
      3. global detection
      4. local detection
      5. tolerance

      Qualifiers

      • Article

      Conference

      SAC07
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

      Upcoming Conference

      SAC '25
      The 40th ACM/SIGAPP Symposium on Applied Computing
      March 31 - April 4, 2025
      Catania , Italy

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 266
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 07 Jan 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media