...
首页> 外文期刊>Computers & Security >Mitigation of network tampering using dynamic dispatch of mobile agents
【24h】

Mitigation of network tampering using dynamic dispatch of mobile agents

机译:使用移动代理的动态调度来缓解网络篡改

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Detection of malicious activity by insiders, people with legitimate access to resources and services, is particularly difficult in a network environment. In this paper, a novel classification of tampering modes is identified that can be undertaken by insiders against network Intrusion Detection Systems (IDSs). Five categories of tampering modes are defined as spoofing, termination, sidetracking, alteration of internal data, and selective deception. These are further distinguished specifically toward IDS sensor, control, and alarm categories such as spoonfeeding, sugarcoating, and scapegoating. The Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions, or CONFIDANT, uses distributed mobile agents to mitigate these tampering exposures. CONFIDANT employs techniques such as encapsulation, redundancy, scrambling, and mandatory obsolescence. This paper describes how these mitigation techniques are applied within the CONFIDANT framework. The approach focuses on evaluating file integrity through the use of dynamically dispatched mobile agents.
机译:在网络环境中,内部人员(拥有对资源和服务的合法访问权限的人员)检测恶意活动特别困难。在本文中,确定了一种新的篡改模式分类,可以由内部人员针对网络入侵检测系统(IDS)进行。篡改模式分为五类:欺骗,终止,旁向跟踪,内部数据更改和选择性欺骗。这些在IDS传感器,控制和警报类别(例如汤匙喂食,糖衣和替罪羊)中特别有区别。使用自主网络事务的内部防御协作对象通知框架,即CONFIDANT,使用分布式移动代理来减轻这些篡改风险。 CONFIDANT采用的技术包括封装,冗余,加扰和强制淘汰。本文介绍了如何在CONFIDANT框架中应用这些缓解技术。该方法着重于通过使用动态调度的移动代理来评估文件完整性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号