|
Indra: A Peer-to-Peer Approach to Network Intrusion Detection and PreventionRamaprabhu Janakiraman, Marcel Waldvogel, and Qi Zhang:Indra: A Peer-to-Peer Approach to Network Intrusion Detection and Prevention, Proceedings of IEEE WETICE 2003 Workshop on Enterprise Security, Linz, Austria, June 2003; Best Paper Award. AbstractWhile the spread of the Internet has made the network ubiquitous, it has also rendered networked systems vulnerable to malicious attacks orchestrated from anywhere. These attacks or intrusions typically start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Attackers rely on increasingly sophisticated techniques like using distributed attack sources and obfuscating their network addresses. On the other hand, software that guards against them remains rooted in traditional centralized techniques, presenting an easily-targeted single point of failure. Scalable, distributed network intrusion prevention techniques are sorely needed. We propose Indra---a distributed scheme based on sharing information between trusted peers in a network to guard the network as a whole against intrusion attempts. We present initial ideas for running Indra over a peer-to-peer infrastructure to distribute up-to-date rumors, facts, and trust information in a scalable way. Documents
BibTeX entry@InProceedings{janakiraman03indra, Author = {Ramaprabhu Janakiraman and Marcel Waldvogel and Qi Zhang}, Title = {Indra: A Peer-to-Peer Approach to Network Intrusion Detection and Prevention}, BookTitle = {Proceedings of IEEE WETICE 2003}, Location = {Linz, Austria}, Year = 2003, Month = jun } |
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.