Attack tolerant enhancement of intrusion detection systems

Y. P. Shen, W. T. Tsai, S. Bhattacharya, T. Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The problem of making an Intrusion detection system (IDS) attack tolerant is discussed and a system architecture is proposed for this purpose. Avoiding single point of failure is the distributed feature in this design which is a major drawack in a centralized system. The architecture is a hybrid of distributed, redundant to increase fault tolerance and cross-corroborating techniques to boost the surveillance. The Prairie Dog system protects the IDS as well as itself and is flexible and scalable. Integrity Checker (IC), the IDS monitor (IDM) and the Neighborhood watcher (NW) are the three major components of the system. The various attack types and their detection is tabulated to study the efficiency of the system.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE Military Communications Conference MILCOM
Pages425-429
Number of pages5
Volume1
StatePublished - 2000
Event21st Century Military Communications Conference Proceedings MILCOM 2000 - Los Angeles, CA, United States
Duration: Oct 22 2000Oct 25 2000

Other

Other21st Century Military Communications Conference Proceedings MILCOM 2000
CountryUnited States
CityLos Angeles, CA
Period10/22/0010/25/00

Fingerprint

Intrusion detection
Fault tolerance

ASJC Scopus subject areas

  • Civil and Structural Engineering
  • Electrical and Electronic Engineering

Cite this

Shen, Y. P., Tsai, W. T., Bhattacharya, S., & Liu, T. (2000). Attack tolerant enhancement of intrusion detection systems. In Proceedings - IEEE Military Communications Conference MILCOM (Vol. 1, pp. 425-429)

Attack tolerant enhancement of intrusion detection systems. / Shen, Y. P.; Tsai, W. T.; Bhattacharya, S.; Liu, T.

Proceedings - IEEE Military Communications Conference MILCOM. Vol. 1 2000. p. 425-429.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shen, YP, Tsai, WT, Bhattacharya, S & Liu, T 2000, Attack tolerant enhancement of intrusion detection systems. in Proceedings - IEEE Military Communications Conference MILCOM. vol. 1, pp. 425-429, 21st Century Military Communications Conference Proceedings MILCOM 2000, Los Angeles, CA, United States, 10/22/00.
Shen YP, Tsai WT, Bhattacharya S, Liu T. Attack tolerant enhancement of intrusion detection systems. In Proceedings - IEEE Military Communications Conference MILCOM. Vol. 1. 2000. p. 425-429
Shen, Y. P. ; Tsai, W. T. ; Bhattacharya, S. ; Liu, T. / Attack tolerant enhancement of intrusion detection systems. Proceedings - IEEE Military Communications Conference MILCOM. Vol. 1 2000. pp. 425-429
@inproceedings{9512d220cbed4608b1a9689abb464e30,
title = "Attack tolerant enhancement of intrusion detection systems",
abstract = "The problem of making an Intrusion detection system (IDS) attack tolerant is discussed and a system architecture is proposed for this purpose. Avoiding single point of failure is the distributed feature in this design which is a major drawack in a centralized system. The architecture is a hybrid of distributed, redundant to increase fault tolerance and cross-corroborating techniques to boost the surveillance. The Prairie Dog system protects the IDS as well as itself and is flexible and scalable. Integrity Checker (IC), the IDS monitor (IDM) and the Neighborhood watcher (NW) are the three major components of the system. The various attack types and their detection is tabulated to study the efficiency of the system.",
author = "Shen, {Y. P.} and Tsai, {W. T.} and S. Bhattacharya and T. Liu",
year = "2000",
language = "English (US)",
volume = "1",
pages = "425--429",
booktitle = "Proceedings - IEEE Military Communications Conference MILCOM",

}

TY - GEN

T1 - Attack tolerant enhancement of intrusion detection systems

AU - Shen, Y. P.

AU - Tsai, W. T.

AU - Bhattacharya, S.

AU - Liu, T.

PY - 2000

Y1 - 2000

N2 - The problem of making an Intrusion detection system (IDS) attack tolerant is discussed and a system architecture is proposed for this purpose. Avoiding single point of failure is the distributed feature in this design which is a major drawack in a centralized system. The architecture is a hybrid of distributed, redundant to increase fault tolerance and cross-corroborating techniques to boost the surveillance. The Prairie Dog system protects the IDS as well as itself and is flexible and scalable. Integrity Checker (IC), the IDS monitor (IDM) and the Neighborhood watcher (NW) are the three major components of the system. The various attack types and their detection is tabulated to study the efficiency of the system.

AB - The problem of making an Intrusion detection system (IDS) attack tolerant is discussed and a system architecture is proposed for this purpose. Avoiding single point of failure is the distributed feature in this design which is a major drawack in a centralized system. The architecture is a hybrid of distributed, redundant to increase fault tolerance and cross-corroborating techniques to boost the surveillance. The Prairie Dog system protects the IDS as well as itself and is flexible and scalable. Integrity Checker (IC), the IDS monitor (IDM) and the Neighborhood watcher (NW) are the three major components of the system. The various attack types and their detection is tabulated to study the efficiency of the system.

UR - http://www.scopus.com/inward/record.url?scp=0034447895&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0034447895&partnerID=8YFLogxK

M3 - Conference contribution

VL - 1

SP - 425

EP - 429

BT - Proceedings - IEEE Military Communications Conference MILCOM

ER -