首页> 外文学位 >Mitigation of network tampering using dynamic dispatch of mobile agents.
【24h】

Mitigation of network tampering using dynamic dispatch of mobile agents.

机译:使用移动代理的动态调度来缓解网络篡改。

获取原文
获取原文并翻译 | 示例

摘要

Detection of malicious activity by insiders, people with legitimate access to resources and services, is particularly difficult in a network environment. In this research, a novel classification of tampering modes by insiders against Intrusion Detection Systems (IDSs) is developed and addressed using distributed processing approaches. First, several user capability ranks and tampering points are identified to categorize critical exposures. Second, a tampering mode taxonomy including spoofing, termination, sidetracking, alteration of internal data, and selective deception is developed. Third, in response to these tampering modes, the Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions (CONFIDANT) is developed and evaluated.; CONFIDANT employs interlocked mobile agents to reduce single point-of-failure exposures and increase barriers against insider tampering. While previous approaches relied upon monolithic architectures or agent frameworks using a centralized control mechanism or common reporting repository, they introduced distinct vulnerabilities. These vulnerabilities are identified in a novel hierarchy of IDS architectures. CONFIDANT realizes a Distributed Control and Dynamic Dispatch (DCDD) architecture using mobile agents for tampering detection, decision making, and alert signaling. It uses three echelons of agent interaction and four autonomous behaviors supporting encapsulation, redundancy, scrambling, and mandatory obsolescence.; The Tampering Mode Exposure (TME) metric weighting scheme is developed to compare CONFIDANT's response to that of the existing frameworks Tripwire and AIDE. Testing is performed to illustrate the mitigation techniques for each tampering mode using the Concordia mobile agent framework. Quantitative as well as qualitative metrics are assessed by dispatching Committees Ci of agents aij where 1 ≤ i ≤ 2, 1 ≤ j ≤ 12 to perform filesystem scans and provide alarm notification. Test results indicate Tripwire's and AIDE's vulnerability to tampering via Pacing, File Juggling, and Altering Internal Data with TME scores of 65 and 59, respectively, out of a possible value of 123. CONFIDANT's DCDD framework achieves a score of 103 through mitigation of several exposures with the exception of Processor Blockading. These results demonstrate viable approaches for mitigating several challenging IDS exposures including many insider tampering risks.
机译:在网络环境中,内部人员(拥有对资源和服务的合法访问权限的人员)检测恶意活动特别困难。在这项研究中,内部人员针对入侵检测系统(IDS)的篡改模式的新颖分类得以开发,并使用分布式处理方法解决。首先,确定几个用户能力等级和篡改点以对关键风险进行分类。其次,开发了一种篡改模式分类法,包括欺骗,终止,旁听,内部数据更改和选择性欺骗。第三,针对这些篡改模式,开发并评估了使用自主网络事务的内部防御协作对象通知框架(CONFIDANT)。 CONFIDANT使用互锁的移动代理来减少单个故障点的暴露并增加防止内部篡改的障碍。尽管先前的方法使用集中式控制机制或通用报告存储库依赖于整体式架构或代理框架,但它们引入了明显的漏洞。这些漏洞是在IDS体系结构的新颖层次结构中确定的。 CONFIDANT使用移动代理实现了篡改检测,决策制定和警报信令,从而实现了分布式控制和动态调度(DCDD)架构。它使用三个层次的代理程序交互和四个自治行为来支持封装,冗余,加扰和强制废弃。开发了篡改模式曝光(TME)度量标准加权方案,以将CONFIDANT的响应与现有框架Tripwire和AIDE的响应进行比较。使用Concordia移动代理框架进行了测试,以说明每种篡改模式的缓解技术。代理aij的调度委员会Ci评估数量和质量指标,其中1≤i≤2,1≤j≤12,以执行文件系统扫描并提供警报通知。测试结果表明,Tripwire和AIDE的漏洞通过TME得分分别为65和59的Pacing,文件变戏和更改内部数据进行篡改,而可能的值是123。CONFIDANT的DCDD框架通过减轻了几次曝光而获得了103的分数除了处理器封锁。这些结果证明了减轻一些具有挑战性的IDS暴露的可行方法,包括许多内部篡改风险。

著录项

  • 作者

    Rocke, Adam J.;

  • 作者单位

    University of Central Florida.;

  • 授予单位 University of Central Florida.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2004
  • 页码 155 p.
  • 总页数 155
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号