首页> 外文会议>IFIP TC11 WG11.3 working conference on database security >Intrusion confinement by isolation in information systems
【24h】

Intrusion confinement by isolation in information systems

机译:通过信息系统隔离侵入限制

获取原文

摘要

System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasonrs. Intrusion detection techniques are therefore used to supplement them. However, damage could have occurred before an intrusion is detected. In many computing systems the requirement for a high degree of soundness of intrusion reporting can yield poor performance in detecting intrusions and can cause long detection latency. As a result, serious damage can be caused either because many intrusions are never detected or because the average detection latency is too long. The process of bounding the damage cause by intrusion during the process of intrusion detection is referred to as intrusion confinement. We justify the necessity for intrusion confinement during detection by a probabilistic analysis mode, and propose a general solution to achieve intrusion confinement. The crux of the solution is to isolate likely suspicious actions before a definite determination of intrusion is reported. We also present a concrete isolation protocol in the file system context to evaluate the feasibility of the general solution, which can be applied in many types of information systems.
机译:系统保护机制,如访问控制可以由授权但恶意用户,伪装者和MISFEARS欺骗。因此,侵入检测技术用于补充它们。但是,在检测到入侵之前可能发生损坏。在许多计算系统中,对入侵报告的高度合理性的要求可以在检测入侵中产生差的性能,并且可能导致长检测延迟。结果,可能导致严重的损坏,因为从未检测到许多入侵或因为平均检测延迟太长。在入侵检测过程中通过侵扰限制损伤原因的过程被称为入侵限制。在通过概率分析模式检测期间,我们证明了入侵限制的必要性,并提出了一般的解决方案来实现入侵限制。解决方案的关键是在报告侵入的确定之前隔离可能的可疑动作。我们还在文件系统上下文中呈现了一个具体隔离协议,以评估一般解决方案的可行性,可以应用于许多类型的信息系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号