scispace - formally typeset
Proceedings ArticleDOI

Intrusion Detection Using Third-Parties Support

Reads0
Chats0
TLDR
A new intrusion detection methodology using the support of other machines so that when an attacker tries to attack other machines from a corrupted machine that the attacker has already intruded, other machines notify it to the administrator of the corrupted machine.
Abstract
Intrusions are one of the most important issues in the current Internet environment. Therefore, a lot of researchers and companies elaborated countermeasure techniques such as intrusion detection systems (IDS) and intrusion prevention systems (IPS). These systems detect intrusions and prevent attackers from succeeding in their intrusion attempts. They usually rely on pattern matching and therefore, work efficiently on known-attacks. However, they do not work efficiently on unknown-attacks such as zero-day attacks and targeted attacks. This means, we should assume that our machines can be corrupted anytime. Therefore, we should consider what we can do under this assumption for a next generation security framework. In this paper, we propose a new intrusion detection methodology using the support of other machines. In our proposal, when an attacker tries to attack other machines from a corrupted machine that the attacker has already intruded, other machines notify it to the administrator of the corrupted machine. Then, the attacker may lose the corrupted machine. Therefore, the attacker restrains itself from imprudently attacking other machines. This will suppress the propagation of corrupted machines in the Internet.

read more

Citations
More filters
Journal ArticleDOI

The Modern Approach in Wireless Intrusion Prevention System for Ad hoc Network: A Target Oriented Approach

S V Athawale, +1 more
TL;DR: The wireless networks have revolutionized the way organizations work and offered a new range of possibilities, but at the same time they introduced new security threats, which require the use of Wireless Intrusion Prevention Systems.
References
More filters
Proceedings ArticleDOI

A scalable content-addressable network

TL;DR: The concept of a Content-Addressable Network (CAN) as a distributed infrastructure that provides hash table-like functionality on Internet-like scales is introduced and its scalability, robustness and low-latency properties are demonstrated through simulation.
Journal ArticleDOI

Chord: a scalable peer-to-peer lookup protocol for Internet applications

TL;DR: Results from theoretical analysis and simulations show that Chord is scalable: Communication cost and the state maintained by each node scale logarithmically with the number of Chord nodes.
Journal ArticleDOI

Towards a taxonomy of intrusion-detection systems

TL;DR: A taxonomy of intrusion-detection systems is introduced that highlights the various aspects of this area and is illustrated by numerous examples from past and current projects.
Book

Building Internet Firewalls

TL;DR: Building Internet Firewalls is a practical guide to building firewalls on the Internet and describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site.
Book

DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype

TL;DR: An overview of the motivation behind DIDS, the system architecture and capabilities, and a discussion of the early prototype of the DIDS is provided.
Related Papers (5)