fidran a flexible intrusion detection and response framework for active networks

fidran a flexible intrusion detection and response framework for active networks

ID:33579593

大小:69.66 KB

頁數(shù):6頁

時間:2019-02-27

fidran a flexible intrusion detection and response framework for active networks_第1頁
fidran a flexible intrusion detection and response framework for active networks_第2頁
fidran a flexible intrusion detection and response framework for active networks_第3頁
fidran a flexible intrusion detection and response framework for active networks_第4頁
fidran a flexible intrusion detection and response framework for active networks_第5頁
資源描述:

《fidran a flexible intrusion detection and response framework for active networks》由會員上傳分享,免費(fèi)在線閱讀,更多相關(guān)內(nèi)容在教育資源-天天文庫

1、FIDRAN:AFlexibleIntrusionDetectionandResponseFrameworkforActiveNetworksA.Hess,M.Jung,G.Sch?ferTelecommunicationNetworksGroup,TechnischeUniversit?tBerlinEinsteinufer25,10587Berlin,GermanyEmail:[hess,mjung,schaefer]@ee.tu-berlin.deAbstractmachinesortheyarejust

2、overstrainedpatchingthese.Fur-thermore,manyusersbelievethattheywillneverbecomeSecuringcommunicationnetworkscannolongerbeen-thetargetofanattack,duetoirregularon-linetimes,chang-suredbysingularandisolatedsecuritytechnologieslikeingIP-addressesorhavingthepercep

3、tionthattheirsystemInternet?rewallsorintrusiondetectionsystemsbutratherordata,respectively,isnotofvalueforpotentialhackers.callsforacombinationofexistingandemergingdetec-Unfortunately,thisisnottrue:As,forexample,Lancetionandresponsemechanisms,e.g.DDoSrespons

4、emech-Spitznerwritesinhisbook[10]:“OnFebruary28,1999,anisms,anomalydetection,honeypots,etc.Today,mostat20:15Iputthehoneypotonline...Within15minutescurrentsystemsprovetobetoostatictoprovideanade-ofmyconnectingthehoneypottotheInternet,anattackerquateplatformfo

5、raconstructiveteamworkofdifferentse-identi?ed,probed,andexploitedit”.Beyondthis,hestatescuritytechnologies.Therefore,wedevelopedtheFIDRANthatahomenetworkwasscannedonaverageby31differentframeworkfor?exibleintrusiondectionandresponsethatissystemsadayinthebegin

6、ningof2002.basedonanunderlyingactivenetworkingenvironmentandAnotherreasonfortherisingdangerarisingofmaliciousthatallowstodynamicallycombineexistingandemergingactivitiesisthealarmingevolutionoftheexecutionspeedsecuritytechnologies.ofcomputerattacks.Consequent

7、ly,thetimewindowtoin-FIDRANfollowsahighlymodularapproachthatallowsvokecountermeasuresinordertolimittheharmofanattacktoextendthefunctionalityoftheframeworkbytheinte-isshrinking[4].Weaverclaimsin[12]thatitispossiblegrationofnewsecuritymoduleswhichareimplemente

8、dastoconstructhyper-virulentactivewormswhicharecapableactivenetworkingservices,makinguseofnextgenerationofinfectingallvulnerablehostsoftheInternetinapproxi-networkscapabilitieslikedynamicdistrib

當(dāng)前文檔最多預(yù)覽五頁,下載文檔查看全文

此文檔下載收益歸作者所有

當(dāng)前文檔最多預(yù)覽五頁,下載文檔查看全文
溫馨提示:
1. 部分包含數(shù)學(xué)公式或PPT動畫的文件,查看預(yù)覽時可能會顯示錯亂或異常,文件下載后無此問題,請放心下載。
2. 本文檔由用戶上傳,版權(quán)歸屬用戶,天天文庫負(fù)責(zé)整理代發(fā)布。如果您對本文檔版權(quán)有爭議請及時聯(lián)系客服。
3. 下載前請仔細(xì)閱讀文檔內(nèi)容,確認(rèn)文檔內(nèi)容符合您的需求后進(jìn)行下載,若出現(xiàn)內(nèi)容與標(biāo)題不符可向本站投訴處理。
4. 下載文檔時可能由于網(wǎng)絡(luò)波動等原因無法下載或下載錯誤,付費(fèi)完成后未能成功下載的用戶請聯(lián)系客服處理。