Intrusion Detection for Object-Based Storage System

被引:0
作者
Yao, Di [1 ]
Feng, Dan [1 ]
机构
[1] Huazhong Univ Sci & Technol, Wuhan, Peoples R China
来源
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5 | 2008年
关键词
Intrusion detection; object-based; storage system; object-based storage device;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since storage systems can see changes to persistent data on them, some types of intrusions can be defected by storage systems. Storage-based intrusion defection system (SIDS) has become a valuable tool in monitoring for the intrusion. However, the traditional storage device works on the block-level while intrusion always happens on the file-level, this gap has to be erased by detection software, which is a hard and lime-consuming task. To solve this problem and to accord with the trend of storage technology, this paper presents a novel idea to design object-based intrusion detection architecture. In this paper, we study how intrusion can be detected at object level in the OBSS (Object-based storage system) environment, and discuss how features of the OBSS can be used in intrusion detection. Through analysis, we find that the impact of intrusion detection on the OBSS is negligible. The advantage of this approach is simple. It does not require many changes to the slot-age system or the intrusion detection software.
引用
收藏
页码:218 / 222
页数:5
相关论文
共 50 条
[31]   Intrusion detection system based on mobile agent [J].
Zhu, LP ;
Li, Q ;
Wang, X .
ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, :7888-7891
[32]   An intrusion detection system based on the clustering ensemble [J].
Weng, Fangfei ;
Jiang, Qingshan ;
Shi, Liang ;
Wu, Nannan .
2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, :121-+
[33]   Intrusion detection system based on data mining [J].
Zhang, Jishan ;
Gan, Yong ;
Bian, Zhiwei .
Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, :1214-1218
[34]   An Intrusion Detection System Based On Fiber Hydrophone [J].
Liu, Junrong ;
Qiu, Xiufen ;
Shen, Heping .
AOPC 2017: FIBER OPTIC SENSING AND OPTICAL COMMUNICATIONS, 2017, 10464
[35]   A Deviation Based Outlier Intrusion Detection System [J].
Pareek, Vikas ;
Mishra, Aditi ;
Sharma, Arpana ;
Chauhan, Rashmi ;
Bansal, Shruti .
RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 :395-401
[36]   Acoustic Based Surveillance System For Intrusion Detection [J].
Zieger, Christian ;
Brutti, Alessio ;
Svaizer, Piergiorgio .
AVSS: 2009 6TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE, 2009, :314-319
[37]   Intrusion Detection System Based on SVM for WLAN [J].
Mohammed, Muamer N. ;
Sulaiman, Norrozila .
FIRST WORLD CONFERENCE ON INNOVATION AND COMPUTER SCIENCES (INSODE 2011), 2012, 1 :313-317
[38]   Intrusion detection with agent-based system [J].
Wasniowski, RA .
SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, :149-152
[39]   Intrusion Detection System Based on ViTCycleGAN and Rules [J].
Fang, Menghao ;
Li, Xia ;
Wang, Yuanyuan ;
Wang, Qiuxuan ;
Sun, Xinlei ;
Zhang, Shuo .
ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT III, ICIC 2024, 2024, 14864 :203-214
[40]   Research on Intrusion Detection System based on IRBF [J].
Peng Yichun ;
Niu Yi ;
Hu Qiwei .
PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, :544-548