Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System

被引:0
作者
Patel, A. [1 ]
Qassim, Q. [1 ]
Shukor, Z. [1 ]
Nogueira, J. [2 ]
Junior, J. [3 ]
Wills, C. [4 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Dept Comp Sci, Bangi 43600, Selangor Darul, Malaysia
[2] Dept Policia Fed, SETEC SR DPF CE, Setor Tecn Cient Criminalist, Fortaleza, Ceara, Brazil
[3] Univ Estadual Ceara, LARCES UECE, Network Comp Lab, Fortaleza, Ceara, Brazil
[4] Univ Kingston, Fac Comp Informat Syst & Math, Kingston Upon Thames, Surrey, England
来源
PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE | 2010年
关键词
Information Security; Intrusion detection; Intrusion Prevention; Anomaly Detection; Misuse Detection; Autonomic Computing; Self-Management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last fifteen years the world has experienced a wide variety of computer threats and general computer security problems. As communication advances and information management systems become more and more powerful and distributed, organizations are becoming increasingly vulnerable to potential security threats such as intrusions at all levels of Information Communication Technology (ICT). There is an urgency to provide secure and safe information security system through the use of firewalls, Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs), encryption, authentication, and other hardware and software solutions. Many intrusion detection and prevention systems have been designed, but still there are significant drawbacks. Some of these drawbacks are low detection efficiency, inaccurate prevention schemes and high false alarm rates. Since IDSs and IPSs have become necessary security tools for detecting and preventing attacks on ICT resources, it is essential to upgrade the previous designs, techniques and methods to overcome flaws. Anomaly detection is an essential component of the detection mechanism against unknown attacks but this requires advanced techniques to be better and more effective. In this paper we put forward a new agent-based self-managed approach of anomaly intrusion prevention system based on risk assessment and managed by the principles of the Autonomic Computing (AC) concept, which has all the flavors of self-management. Applying AC will open up new frontiers, and enhance and improve the intrusion detection mechanism by not only protecting the system's information and assets but also to stop and prevent the breach before it happens. It can also assist in digital forensics and investigations.
引用
收藏
页码:223 / 234
页数:12
相关论文
共 17 条
[1]  
[Anonymous], 2017, Principles of information security
[2]   Autonomic personal computing [J].
Bantz, DF ;
Bisdikian, C ;
Challener, D ;
Karidis, JP ;
Mastrianni, S ;
Mohindra, A ;
Shea, DG ;
Vanover, M .
IBM SYSTEMS JOURNAL, 2003, 42 (01) :165-176
[3]  
Barika F. A., 2009, Journal of Software, V4, P495
[4]  
Bidgoli H., HDB INFORM SECURITY, V3
[5]  
Deri Luca, 2003, TER NETW C 2003
[6]  
Bringas PG, 2009, LECT NOTES BUS INF P, V19, P117
[7]   A survey of autonomic computing - Degrees, models, and applications [J].
Huebscher, Markus C. ;
McCann, Julie A. .
ACM COMPUTING SURVEYS, 2008, 40 (03)
[8]   Intrusion Prevention System Base on Immune Vaccination [J].
Jiang, Yaping ;
Chang, Junlin .
ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL I, PROCEEDINGS, 2009, :350-353
[9]   The vision of autonomic computing [J].
Kephart, JO ;
Chess, DM .
COMPUTER, 2003, 36 (01) :41-+
[10]  
Kutnick Dale, 2001, IBM ADV AUTONOMIC CO