Intrusion detection for distributed applications

被引:24
|
作者
Stillerman, M [1 ]
Marceau, C [1 ]
Stillman, M [1 ]
机构
[1] Odyssey Res Associates, Ithaca, NY 14850 USA
关键词
D O I
10.1145/306549.306577
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A distributed application is vulnerable to attack code masquerading as one of the components. An application that has been trained to recognize "itself" can reject such imposters.
引用
收藏
页码:62 / 69
页数:8
相关论文
共 50 条
  • [41] Guaranteed intrusion removal from monitored distributed applications
    Wu, WQ
    Spezialetti, M
    Gupta, R
    EIGHTH IEEE SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING, PROCEEDINGS, 1996, : 422 - 425
  • [42] The Search for Efficiency in Automated Intrusion Response for Distributed Applications
    Wu, Yu-Sung
    Modelo-Howard, Gaspar
    Foo, Bingrui
    Bagchi, Saurabh
    Spaffor, Eugene H.
    PROCEEDINGS OF THE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, 2008, : 53 - +
  • [43] Distributed model of intrusion detection system based on agent
    Ma, Heng-Tai
    Jiang, Jian-Chun
    Chen, Wei-Feng
    Qing, Si-Han
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (10): : 1312 - 1319
  • [44] Towards Lightweight and Efficient Distributed Intrusion Detection Framework
    Yuan, Shuai
    Li, Hongwei
    Zhang, Rui
    Hao, Meng
    Li, Yiran
    Lu, Rongxing
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [45] Integration of Distributed Intrusion Detection Systems in IoT Infrastructure
    Bimenyimana, Christian Ildegard
    Nsabimana, Thierry
    Vlavonou, Ghislain
    Hounsou, Joel T.
    Niyonsaba, Gerard
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 5, ICICT 2024, 2024, 1000 : 115 - 123
  • [46] Using Attacks Ontology in Distributed Intrusion Detection System
    Abdoli, F.
    Kahani, M.
    ADVANCES IN COMPUTER AND INFORMATIOM SCIENCES AND ENGINEERING, 2008, : 153 - +
  • [47] Survey on alert correlation methods in distributed intrusion detection
    Sun, Jingru
    Dong, Xiaomei
    Yu, Ge
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (07): : 58 - 59
  • [48] Intrusion detection and security policy framework for distributed environments
    El Kalam, AA
    Briffaut, J
    Toinard, C
    Blanc, M
    2005 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS, 2005, : 100 - 105
  • [49] The case for collaborative distributed wireless intrusion detection systems
    Beyah, Raheem A.
    Corbett, Cherita L.
    Copeland, John A.
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 782 - +
  • [50] Collaborative Intrusion Detection Method for Marine Distributed Network
    Li, Xin
    JOURNAL OF COASTAL RESEARCH, 2018, : 57 - 61