【24h】

Storage-Based Intrusion Detection

机译:基于存储的入侵检测

获取原文
获取原文并翻译 | 示例

摘要

Storage-based intrusion detection consists of storage systems watching for and identifying data access patterns characteristic of system intrusions. Storage systems can spot several common intruder actions, such as adding backdoors, inserting Trojan horses, and tampering with audit logs. For example, examination of 18 real intrusion tools reveals that most (15) can be detected based on their changes to stored files. Further, an Intrusion Detection System (IDS) embedded in a storage device continues to operate even after client operating systems are compromised. We describe and evaluate a prototype storage IDS, built into a disk emulator, to demonstrate both feasibility and efficiency of storage-based intrusion detection. In particular, both the performance overhead (< 1%) and memory required (1.62MB for 13995 rules) are minimal.
机译:基于存储的入侵检测由存储系统组成,这些存储系统监视并识别系统入侵特有的数据访问模式。存储系统可以发现几种常见的入侵者操作,例如添加后门,插入特洛伊木马和篡改审核日志。例如,对18种真实入侵工具的检查表明,大多数(15)可以基于它们对存储文件的更改而被检测到。此外,即使在客户端操作系统受到威胁后,嵌入在存储设备中的入侵检测系统(IDS)仍可继续运行。我们描述并评估了内置在磁盘仿真器中的原型存储IDS,以演示基于存储的入侵检测的可行性和效率。特别是,性能开销(<1%)和所需的内存(对于13995规则为1.62MB)都是最小的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号