Monitoring Android for Collaborative Anomaly Detection: A First Architectural Draft
|
|
|
- Primrose Hudson
- 10 years ago
- Views:
Transcription
1 Monitoring Android for Collaborative Anomaly Detection: A First Architectural Draft Technical Report: TUB-DAI 08/08-02 Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther Schmidt, Kamer Ali Yüksel, Osman Kiraz, Jan Clausen, Karsten Raddatz, Ahmet Camtepe, and Sahin Albayrak August 21, 2008
2 DAI-Labor der Technischen Universität Berlin Prof. Dr.-Ing. habil. Sahin Albayrak Technische Universität Berlin / DAI-Labor Institut für Wirtschaftsinformatik und Quantitative Methoden Fachgebiet Agententechnologien in betrieblichen Anwendungen und der Telekommunikation Sekretariat TEL 14 Ernst-Reuter-Platz Berlin Telefon: (030) Telefax: (030) [email protected] WWW: 2
3 Contents 1 Introduction 4 2 Related Work Mobile Device Intrusion Detection Intrusion Detection Systems in Ad-Hoc Networks Overall System Architecture 7 4 Monitoring and Detection Client Architecture Linux Operating System Level Linux Application Level Java Application Level General Detection Architecture Detection Mechanism Server supported learning Collaborative Intrusion Detection in Ad-Hoc Network Scenario Conclusion and Future Work 14 7 Acknowledgements 14 References 14 List of Figures 1 Overall System Architecture Monitoring and Detection Client Architecture Architecture of Detection Mechanism List of Tables 3
4 1 Introduction Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses. This report is structured as follows. In Section 2, related work to mobile device-based intrusion detection with a focus on Ad-Hoc networks is presented. Section 3 introduces a simple global system architecture. In Section 4, the structure of the monitoring and detection client for mobile devices is presented. Section 5 describes the detection architecture of the system. Finally in Section 6, we conclude. 4
5 2 Related Work Several efforts made by researchers to counter the expected outcome of attacks on smartphones. The early attempts started by adapting existing security solutions developed for PCs to mobile devices. Then, mobile specific light-weight intrusion detection systems started to be designed due to resource constraints of mobile devices in terms of memory and power. Furthermore, there were attempts to enhance these architectures using collaborative schemes. Especially use of mobile ad-hoc networks has made researchers to put effort on collaborative approaches. Since intrusion detection is quite a large research area, we will focus on IDS suitable for mobile and ad-hoc networks in this work. 2.1 Mobile Device Intrusion Detection Guo et al. [1] describes possible attacks for smart-phones, which range from privacy violation and identity theft to emergency call center DDoS attacks and national crises, concerning their interoperability between the telecom networks and the Internet. They also describe defense solution space including smart-phone hardening approaches, Internetside defense, telecom-side defense, and coordination mechanisms that may be needed between the Internet and telecom networks. They intend to layout the landscape and solution space rather then proposing full-fledged solutions. Venugopal et al. [2] outline the considerations for malware detection on mobile devices and propose a signature based malware detection method that is well suited for use in mobile device scanning due to its low memory requirements and high scanning speed. Later, they compare their signature matching algorithm with Clam-AV 1 scanner to evaluate its efficiency. However, their method is not able to detect new malware or variants of existing malware whose signatures are not in the database; thus, needs frequent updates which causes higher battery consumption. Nash et al. [3] designed an IDS against a unique form of DoS attack known as a battery exhaustion attack by taking into account the performance, energy, and memory constraints of mobile devices. Their IDS uses several parameters, such as CPU load and disk accesses, to estimate the power consumption per process using a linear regression model, to identify processes that might be battery exhaustion attacks. Using energyusage-based detection system have the advantage that they only need to monitor one characteristic for indicating incidents. Kim et al. [4] propose a power-aware malware-detection framework that monitors, detects, and analyzes previously unknown energy-depletion threats. The framework is composed of a power monitor which collects power samples and builds a power consumption history from the collected samples, and a data analyzer which generates a power signature from the constructed history. Similarities between power signatures are measured by the χ 2 -distance, in order to reduce both false-positive and false-negative detection rates. Davis et al. [5] propose a host based intrusion detection engine (HIDE). It has the goal to alert a user when a suspected attack is underway before irreparable damage is caused. Therefore, HIDE first monitors anomalous behavior of the battery when it fails 1 5
6 to go into suspend or sleep mode. Then HIDE sends an alarm message to the user and the nearest proxy server. It starts to write logs that contain the causes of the higher power consumption. In the next step, HIDE suggests mitigation measures. Cheng et al. [6] developed a system that uses system and log file monitoring in order to detect malware infections. Therefore, a monitoring client is installed on a Windows Mobile 5 device that is able to determine its own phone number, the date, the cell id, the SMS and calling logs. Statistical and abnormality-based analysis for processing the monitored data is used. For privacy and authentication, ticketing and encryption is introduced. Whenever an infection is detected, the system alerts the corresponding device as well as all devices with contact to the infected one. They evaluate their approach with a simulation basing on SMS traces coming from a cellular-network provider from India. The problem about this approach is that malware might circumvent that activities will be logged. Buennenmeyer et al. [7] present an approach for monitoring current changes on a smartphone in order to detect anomalies. The changes can be caused by malwares and external attackers, e.g. flooding or network probing. The monitored data is sent to a remote server that creates profiles of each monitored device and hence is able to detect anomalies. They evaluate the power consumption of the monitoring and state that the client uses less than 2% of battery resources compared with the corresponding baseline battery lifetime. Samfat and Molva [8] presented a distributed intrusion detection system for cellular networks that tries to detect abusive behavior like masquerading or eavesdropping. They use learning algorithms in order to obtain user profiles, which in turn are used as signatures to detect abnormal behavior. Example features are call length or cell information. They use network-based intrusion detection and do not try to detect on-device malware. Therefore, this approach is limited to attacks creating network data. Miettinen et al. [9] designed an intrusion detection framework, which uses host-based and network-based intrusion detection. If an anomaly is detected on a mobile device, the device sends an intrusion alert to a back-end server. This server is able to collect further information from network-based sensors in order to create network related intrusion alarms when necessary. Miettinen et al. do not remotely store or analyze device data. Furthermore, they use a correlation engine in order to correlate the device and network intrusion alarms. The increasing capabilities of mobile devices nowadays allow the deployment of a light-weight version of this approach. Bose et al. [10] propose behavioral detection framework to detect mobile malware, instead of the signature-based solution currently available for use in mobile devices. They represent malware behaviors based on a key observation that the logical ordering of an applications actions over time often reveals the malicious intent even when each action alone may appear harmless. Also, they propose a two-stage mapping technique that constructs these malicious behavior signatures at run-time from the monitored system events and API calls while studying 25 distinct families of mobile malware in Symbian OS. They discriminate the malicious behavior of malware from the normal behavior of applications by training a classifier based on Support Vector Machines. They offer a good alternative to signature-based detection because of its smaller database that includes behavior signatures for each malware family, and capability of detecting new malware variants. 6
7 Schmidt et al. [11] implemented a Symbian OS-based monitoring client that uses a remote server for anomaly detection. The server-side detection framework allows the use of various detection plug-ins. This approach is realizable on most current smartphones where the battery usage of the system depends on the configuration of the communication frequency. 2.2 Intrusion Detection Systems in Ad-Hoc Networks Traditional intrusion detection systems are not considered sufficient to satisfy the security needs of ad-hoc networks due to their different characteristics from infrastructure networks. Zhang et al. [12] mentioned that a better intrusion detection in mobile computing environment should be distributed and cooperative. They proposed to use anomaly detection models constructed using information available from the routing protocols for intrusion detection purposed. The work of Hubaux et al. [13] takes care about selfish node intentionally dropping packets. Here, a stimulation scheme based on a trusted and tamper resistant hardware module was proposed. According to Srinivasan et al. [14], such proposals have been made by several works [13, 15, 16, 17, 18] however that approach has a drawback that involvement of each package results in large overheads. Huang et al. [19] presented a cluster-based detection approach for intrusion detection system and showed that they could maintain the same level of detection performance as the original per-node detection scheme whereas the host CPU utilization was about 29 percent while the mobility of mobile ad-hoc network was low. Their work had some strong assumption such as the existence of public key technology which is obviously controversial that the maintenance of such a technology may not be available for ad-hoc networks. Sterne et al. [20] proposed a generalized, cooperative intrusion detection architecture which has a dynamic topology and cluster heads. They pointed the challenges of node mobility and the architecture they proposed was intended to address these challenges. In fact, all the approaches which are mentioned above have an important value in order to maintain collaboration among distinct nodes in ad-hoc networks. Correlatively, our approach also aims to maintain such a collaboration, but we are not targeting at first the specific challenges arising in ad-hoc networks but to use this networking mode for the scenarios shown in Section 5.3. These scenarios mainly describe cases with existing and absent detection server. However, the on-going research about security and reliability challenges is interesting for further extensions of our approach. 3 Overall System Architecture The overall system basically realizes a client-server architecture which can be seen on Figure 1. It basically provides three main functionalities: 1. On-device analysis 7
8 2. Collaboration 3. Remote analysis The client gathers data for on-device, collaboration, or remote analysis. For improving detection, data can be exchanged between two mobile clients. This data can consist, e.g. of detection results or anomalous feature vectors. Whenever on-device detection is not feasible, the client can send data to the remote server. In turn, the server can send detection results back to client. Additionally, it can send commands for reconfiguring the client. For collaboration purpose, the client can exchange monitoring and detection results with other compatible clients. Remote Detection Server Remote Analysis Remote Analysis On-device Analysis On-device Analysis Collaboration Monitoring and Detection Client Monitoring and Detection Client Figure 1: Overall System Architecture 4 Monitoring and Detection Client Architecture Figure 2 shows the architecture of the monitoring and detection client. The bottom-up view on it starts with the Linux operating system level generating signals received by the actual monitoring components. The Linux application level provides all the functionality needed for monitoring and storing device and operating system information. On Java application level anomaly detection, detection collaboration, and detection response are realized where the corresponding states can be visualized in a user interface. 4.1 Linux Operating System Level The Linux operating system level provides events that are recognized by the monitoring system. These events are initiated by kernel or file system changes. 8
9 Graphical User Interface Collaboration Response Communication Detection Manager Meta Detection Unit Detection Unit 1... JDBI Java Application Level Interconnect Daemon SQLite CTRL- DMN EDM Kernel Monitoring Filesystem Monitoring Log-file Monitoring Network Monitoring... DBI Linux Application Level GNWS... CLF... FIC LSOF... GPL GSSC GSC File System Network... Linux Kernel Linux Operating System Level Figure 2: Monitoring and Detection Client Architecture 4.2 Linux Application Level The monitoring architecture on Linux application layer consists of two programs: the monitoring application and the control daemon. The control daemon is responsible for checking the status and persistence of the monitoring application. The monitoring application extracts information (features) from the Linux kernel and file system. These features are used by the detection for creating a sense of normality. Therefore, the features contain information about the hardware and software states of the device. It has an generic and extensible design for modifying it to corresponding needs. Interconnect Daemon This is the main module of the monitoring application. It is triggered and controlled by the event detection module for generating vectors containing features. Event Detection (EDM) This is an essential component of the monitoring system. It recognizes changes in the kernel and file system and generates corresponding events, e.g. new process is started. Basing on these events, features are 9
10 extracted that can vary in their content and size. Each feature is marked with a time stamp and event for later processing. Kernel Monitoring This module extracts kernel-based features. Examples for this are process lists, system call traces, and symbol tables. Filesystem Monitoring This module extracts and verifies information on files. Examples for this are a list of open files or an integrity check on predefined files. Log-file Monitoring Since Android and many applications support logs, this module extracts information on changes and existence of these. Network Monitoring This module can extract information on current network configurations, configuration changes, network status, and network traffic. Database Interface (DBI) This interface provides access to the Android SQLite database from Linux application level. It is mainly used to store the feature vectors created by the event detection module. 4.3 Java Application Level The monitoring and detection architecture on Java application layer realizes several tasks for anomaly detection, detection collaboration, and detection response. Detection The detection module runs light-weight detection algorithms basing on feature vector excerpts from the database. It consists of a detection manager coordinating a variable amount of detection plug-ins. These plug-ins are instances of detection algorithm that on the one hand can analyze feature vectors and on the other hand can analyze results from different detection algorithms. Whenever cooperative detection algorithms are used, it can additionally trigger the collaboration module. Collaboration The collaboration module provides the means to enable detection as well as response in a collaborative manner as an API. Therefore, the collaboration module stores the node configuration of the device in a dedicated data model. Based on this model, interests for the collaboration can be defined that are matched against other node configurations. Thus, partners for the purpose of collaboration are found and communicated with via the communication module. Response This module enables countermeasures to detected incidents. Communication For exchanging feature vectors with the remote server or collaborative peers, this module provides suitable functions and network access. Java Database Interface (JDBI) This interface provides access to the Android SQLite database from Java application level. It is mainly used to extract feature vectors and detection results recorded by the system. 10
11 Graphical User Interface This module visualizes current monitoring, detection, collaboration, and response status. 5 General Detection Architecture An open system like Android requires protection against unwanted software and intrusion. In general there are two principal techniques handling this, namely misuse detection and anomaly detection. The former method is intended to recognize known signatures of malware and attacks, the latter to determine the degree of normality of some observables. Since there is no malware existent for the Android device, our focus is set on anomaly detection. Anomaly detection can be used to identify new unknown attacks, which in turn can be used on- and offline to generate signatures for fast detection in the future. Note that the detection achitecture does not need to be changed for misuse detection. The question arises what normality means. In our approach we distinguish an individual and a common sense of normality. Either are learned statistically and each device can check a system state according to both measures. When constructing a detection mechanism for a mobile device such as Android, the computational costs has to be kept acceptable due to the limited resources and the need of energy saving. Thus energy efficiency is a guide line for the architecture. Taking this into account, complex computational task and the storage of huge data sets is outsourced to an external server and the on-device detection algorithm is kept relatively simple. Since each detection requires energy, the system integrity should not be checked more often then really necessary, i.e., only on certain occasions. Hence, an event-based approach seems more reasonable than, e.g. a time-periodical one. Furthermore, neighbor devices are taken account in order to collaborate and exchange data in the existence of an ad-hoc network. 5.1 Detection Mechanism According to our approach five major tasks have to be handled: 1. Event perception, which is done by an event sensor (event detection module (EDM)). 2. System monitoring, to gain informations about some system observables (features) when required. For each class of event there is an adequate monitoring module, recall Figure 2, the entirety of those we will call system monitor. 3. Detection, i.e. analyzing system features and assigning a level of normality, done by the detector, which consists of a detection manager and event-specific detection units and meta detection units. 4. Learning, which the external server is responsible for. 11
12 Remote server provides learned function Sends event class, provides event-based feature vector, and triggers detection Detection Manager Collaboration Event-based Meta Detection Unit Event-based Detection Unit... Manages event-based Detection Java Application Level Sends event class and triggers monitoring Perceives event class notifications Event Detection (EDM) Interconnect Daemon Event-based Kernel Monitoring Extractor 1 Extractor 2 Extractor n Creates feature vector Linux Application Level Extracts features Event Classes New Process Other Event Class New Connection OS Data Linux Operating System Level Figure 3: Architecture of Detection Mechanism 5. Collaboration, which is used in the absence of external server or for reducing the load from the external server. As the first two units are already described in previous chapters, we present the last three. The detection manager is a daemon, which can be implemented as an Android activity. It is set on auto start and on the highest priority level. The system is prevented from stopping the detection manager via the method setpersistent(). In this way, it is assured that it runs permanently in the background. Normally, an activity should not be set persistent since then it blocks system capacities. The jobs which have to be accomplished by this unit is receiving signals sent by the event detection module and starting a corresponding detection unit. The latter are implemented as sub-activities and assign to each feature vector a level of abnormality and returns it (in a bundle) to the detection manager. If it exceeds a predefined threshold, the detection manager will alert the user via GUI. The external server does the hard work of statistical learning. The accumulated training data is sent from the database of a mobile device to a server, and in turn the server provides updated parameters for the detection to the mobile device. For a more detailed view on learning see 5.2. Let the interaction of these units be described by an example. Assume that one of the events we described occurs, say a new process is being launched. This event is sensed by the event detection module, which informs immediately the system monitor and the detection manager about which kind of event has occurred. The system monitor then extracts some (event-specific) system features, in this case the sequence of system 12
13 calls caused by this new process along with CPU/memory utilization and other process data. Meanwhile the detection manager has started an event-specific detection unit, i.e. the detection unit corresponding to the process-started event. This detection unit evaluates then the level of alert from the feature vector provided by the system monitor. 5.2 Server supported learning Independent from which reasonable learning technique is chosen, the algorithm for that cannot be performed on the mobile device. Hence, the training data is gradually stored in a database and - after a certain threshold of data amount has been accumulated - sent to a server, where the individual detection parameters are evaluated. Training data is separated according to event class so that event specific detection parameters are determined, which will be sent back afterwards. Each detection unit attains in this way an understanding of normal system behavior which follows each specific event. Furthermore the server also calculates a common sense of normality based on the broad statistical data of all users and makes these common parameters available for the detection units of each user. The reason for that is that user behavior might switch abrupt if, e.g., a new application has been recently installed. Then the detection unit will state a high individual level of alert whereas it will claim that the system behavior is fairly normal relative to other users, since some of which might have already worked with this new application. 5.3 Collaborative Intrusion Detection in Ad-Hoc Network Scenario In the scope of the proposed detections scheme we consider two scenarios for the collaborative approach: on the one hand, the server might not be available. A dedicated server always represents a single-point-of-failure. In the case of a loss of service or limited access, the collaborative scheme can enable at least a baseline of detection. On the other hand, ongoing-research investigates further collaboration scenarios supplementing the server-based approach by further measures. Here, we consider collaborative file integrity checking as an interesting scheme. In general, the collaborative scenarios can be summarized as following: Neighbor does a considerable amount of computation for the initiating device (a) Neighbor exchanges data with less computation effort to an initiating device (b) Keeping in mind those concepts, we have developed two generic protocols which can be used for different events and features. There exists necessity for specifying collaboration partners since possibly not all neighbors have the same interests for collaboration (e.g. One may have a different kernel version which consequently uses different system calls). Both protocols have a common initial message traffic for the confirmation of the collaborating partners. In order to express a specification, the node configuration is stored on each device. The protocol related to (a) contains message traffic for a specific 13
14 computation, e.g. a node sends a feature vector to the neighbors and expects them to compute anomaly status based on their detection unit. Second, the protocol related to (b) contains message exchange of data which considerably requires less effort, e.g. a node requests detectors from his neighbors for a specific event. This example can compensate the absence of a server. 6 Conclusion and Future Work This work presents an initial architecture for monitoring Android-based devices. Therefore, a dual system is used allowing on-device and remote anomaly detection. Future work will show the feasibility of this approach in terms of resource usage and detection quality. 7 Acknowledgements We thank Kamer Ali Yüksel, Osman Kiraz, Karsten Raddatz, and Hans-Gunther Schmidt for their enduring work while attending DAI-Labor security course and being intership student. References [1] Guo, C., Wang, H.J., Zhu, W.: Smartphone attacks and defenses. In: Proceedings of the Third Workshop on Hot Topics in Networks HotNets-III, San Diego, CA USA (2004) [2] Venugopal, D., Hu, G.: Efficient signature based malware detection on mobile devices. Mobile Information Systems 4(1) (2008) [3] Nash, D.C., Martin, T.L., Ha, D.S., Hsiao, M.S.: Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices. In: PER- COMW 05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, Washington, DC, USA, IEEE Computer Society (2005) [4] Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceeding of the 6th international conference on Mobile systems, applications, and services, Breckenridge, CO, USA, ACM (2008) [5] Jacoby, G., Davis, N.: Battery-based intrusion detection. In: Global Telecommunications Conference, GLOBECOM 04. IEEE. Volume 4. (2004) [6] Cheng, J., Wong, S.H.Y., Yang, H., Lu, S.: Smartsiren: virus detection and alert for smartphones. In: International Conference on Mobile Systems, Applications, and Services (Mobisys 2007). (2007)
15 [7] Buennemeyer, T.K., Nelson, T.M., Clagett, L.M., Dunning, J.P., Marchany, R.C., Tront, J.G.: Mobile device profiling and intrusion detection using smart batteries. In: HICSS 08: Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences, Washington, DC, USA, IEEE Computer Society (2008) 296 [8] Samfat, D., Molva, R.: IDAMN: An Intrusion Detection Architecture for Mobile Networks. IEEE Journal on Selected Areas in Communications 15(7) ( September 1997) [9] Miettinen, M., Halonen, P., Hätönen, K.: Host-Based Intrusion Detection for Advanced Mobile Devices. In: AINA 06: Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 2 (AINA 06), Washington, DC, USA, IEEE Computer Society (2006) [10] Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: Proceeding of the 6th international conference on Mobile systems, applications, and services, Breckenridge, CO, USA, ACM (2008) [11] Schmidt, A.D., Peters, F., Lamour, F., Albayrak, S.: Monitoring smartphones for anomaly detection. In: MOBILWARE 2008, International Conference on MO- BILe Wireless MiddleWARE, Operating Systems, and Applications, Innsbruck, Austria (2008) [12] Zhang, Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. Wireless Networks 9(5) (2003) [13] Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 8(5) (October 2003) [14] Srinivasan, V., Nuggehalli, P., Chiasserini, C.F., Rao, R.R.: Cooperation in wireless ad hoc networks. In: In Proceedings of IEEE Infocom. (2003) [15] Buttyán, L., Hubaux, J.P.: Enforcing service availability in mobile ad-hoc wans. (2000) [16] Blazevic, L., Buttyan, L., Capkun, S., Giordano, S., Hubaux, J., Boudec, J.L.: Self organization in mobile ad hoc networks: the approach of terminodes. Communications Magazine, IEEE 39(6) (2001) [17] Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, Massachusetts, United States, ACM (2000) [18] Srinivasan, V., Nuggehalli, P., Chiasserini, C.F., Rao, R.R.: Energy efficiency of ad hoc wireless networks with selfish users. in European Wireless Conference 2002 (EW2002) (2002) 15
16 [19] an Huang, Y.: A cooperative intrusion detection system for ad hoc networks. In SASN 03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (2003) [20] Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C., Balupari, R., Tseng, C.Y., Bowen, T.: A general cooperative intrusion detection architecture for manets. In: Proceedings of the Third IEEE International Workshop on Information Assurance. (March 2005)
Static Analysis of Executables for Collaborative Malware Detection on Android
Static of Executables for Collaborative Malware Detection on Android Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther Schmidt, Jan Clausen, Osman Kiraz, Kamer Ali Yüksel, Seyit Ahmet Camtepe, and Sahin
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Journal of Engineering Science and Technology Review 5 (1) (2012) 63-71. Review Article. Overview of Real-Time Antivirus Scanning Engines
Jestr Journal of Engineering Science and Technology Review 5 (1) (2012) 63-71 Review Article JOURNAL OF Engineering Science and Technology Review www.jestr.org Overview of Real-Time Antivirus Scanning
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS
MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS Hristo Emilov Froloshki Department of telecommunications, Technical University of Sofia, 8 Kliment Ohridski st., 000, phone: +359 2 965 234, e-mail:
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
A Practical Analysis of Smartphone Security*
A Practical Analysis of Smartphone Security* Woongryul Jeon 1, Jeeyeon Kim 1, Youngsook Lee 2, and Dongho Won 1,** 1 School of Information and Communication Engineering, Sungkyunkwan University, Korea
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
The Behavioral Analysis of Android Malware
, pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P Abstract: Now a day s most of the people used in smart phones. Smartphone
Data Mining For Intrusion Detection in Mobile Systems
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 6, Issue 5 (Nov. - Dec. 2012), PP 42-47 Data Mining For Intrusion Detection in Mobile Systems 1, Seyed Hasan Mortazavi
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Fundamentals of a Windows Server Infrastructure MOC 10967
Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation
Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols
Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols Farooq Anjum Applied Research Telcordia. Tech Inc. Morristown NJ 796 [email protected]
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview
MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
State of Vermont. Intrusion Detection and Prevention Policy. Date: 11-02-10 Approved by: Tom Pelham Policy Number:
State of Vermont Intrusion Detection and Prevention Policy Date: 11-02-10 Approved by: Tom Pelham Policy Number: 1 Table of Contents 1.0 Introduction... 3 1.1 Authority... 3 1.2 Purpose... 3 1.3 Scope...
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Network Security: A Practical Approach. Jan L. Harrington
Network Security: A Practical Approach Jan L. Harrington ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Online Network Traffic Security Inspection Using MMT Tool
Online Network Traffic Security Inspection Using MMT Tool Wissam Mallouli, Bachar Wehbi, Edgardo Montes de Oca Michel Bourdellès, Denis Rocher and Arnaud Baloche Montimage EURL, 39 rue Bobillot, 75013
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Detecting Computer Worms in the Cloud
Detecting Computer Worms in the Cloud Sebastian Biedermann and Stefan Katzenbeisser Security Engineering Group Department of Computer Science Technische Universität Darmstadt {biedermann,katzenbeisser}@seceng.informatik.tu-darmstadt.de
How To Secure Cloud Computing
Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)
ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture
, pp. 127-136 http://dx.doi.org/10.14257/ijfgcn.2015.8.1.14 High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture Gengxin Sun and Sheng Bin International College
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
How To Protect Your Mobile From Attack From A Signalling Storm
ICL, TUB, CERTH, Telecom Italia IT, COSMOTE, HISPASEC Erol Gelenbe Fellow of the French National Academy of Engineering Dynamic Real-Time Security for Seamless Service Provisioning in the Mobile Ecosystem
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Network Security Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 2 Collaboration with Frank Akujobi
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Course Outline. ttttttt
10967 - Fundamentals of a Windows Server Infrastructure General Description Learn the fundamental knowledge and skills that you need to build a Windows Server infrastructure with Windows Server 2012. This
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Outline Genesis - why we built it, where and when did the idea begin Issues
CAPTCHA-based DDoS Defense System of Call Centers against Zombie Smart-Phone
CAPTCHA-based DDoS Defense System of Call Centers against Zombie Smart-Phone Seung Wook Jung Soongsil University [email protected] Abstract Recently, some researchers alarm the security community that
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
Implementation of a Department Local Area Network Management System
Implementation of a Department Local Area Network Management System I-Ping Hsieh Lai-Ming Shiue Shang-Juh Kao Department of Computer Science Department of Applied Mathematics Department of Computer Science
USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION. Integrated Information Systems Group, Ruhr University Bochum, Germany
USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION Daniel Hamburg,1 York Tüchelmann Integrated Information Systems Group, Ruhr University Bochum, Germany Abstract: The increase of
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
