Policy-Based Security Configuration Management Application to Intrusion Detection and Prevention

被引:0
|
作者
Alsubhi, Khalid [1 ]
Aib, Issam [1 ]
Francois, Jerome [2 ]
Boutaba, Raouf [1 ]
机构
[1] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
[2] MADYNES, INRIA Lorraine, CNRS, Nancy, France
基金
加拿大自然科学与工程研究理事会;
关键词
Security management policies; Security Configuration; Risk Management; Alert Management;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of an enterprise information system. IDPSes can be network or host-based and can collaborate in order to provide better detections of malicious traffic. Although several IDPS systems have been proposed, their appropriate configuration and control for effective detection and prevention of attacks has always been far from trivial. Another concern is related to the slowing down of system performance when maximum security is applied, hence the need to trade off between security enforcement levels and the performance and usability of an enterprise information system. In this paper we motivate the need for and present a policy-based framework for the configuration and control of the security enforcement mechanisms of an enterprise information system. The approach is based on dynamic adaptation of security measures based on the assessment of system vulnerability and threat prediction and provides several levels of attack containment. As an application, we have implemented a dynamic policy-based adaptation mechanism between the Snort signature-based IDPS and the light weight anomaly-based Fire Collaborator IDS. Experiments conducted over the DARPA 2000 and 1999 intrusion detection evaluation datasets show the viability of our framework.
引用
收藏
页码:1051 / +
页数:2
相关论文
共 50 条
  • [31] The Zodiac Policy Subsystem: a Policy-Based Management System for a High-Security MANET
    Cheng, Yuu-Heng
    Raykova, Mariana
    Poylisher, Alex
    Alexander, Scott
    Eiger, Martin
    Bellovin, Steve M.
    2009 IEEE INTERNATIONAL SYMPOSIUM ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, 2009, : 174 - 177
  • [32] Policy-based proactive monitoring of security policy performance
    Bogdanov, Vitaly
    Kotenko, Igor
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 197 - +
  • [33] Policy-based IPsec management
    Li, M
    IEEE NETWORK, 2003, 17 (06): : 36 - 43
  • [34] Policy-based network management
    Choudhary, AR
    BELL LABS TECHNICAL JOURNAL, 2004, 9 (01) : 19 - 29
  • [35] Policy-based network management
    Wang, CK
    2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, 2000, : 101 - 105
  • [36] Self-configuration of grid nodes using a policy-based management architecture
    García, FJ
    Cánovas, S
    Martínez, G
    Gómez-Skarmeta, AF
    COMPUTATIONAL SCIENCE - ICCS 2004, PT 3, PROCEEDINGS, 2004, 3038 : 158 - 165
  • [37] Policy-based frequency management
    Wagner, Gregory C.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1775 - 1779
  • [38] Scmbug: Policy-based integration of software configuration management with bug-tracking
    Makris, K
    Ryu, KD
    USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX/OPEN SOURCE TRACK, 2005, : 11 - 22
  • [39] Policy-Based Profiles for Network Intrusion Response Systems
    Hughes, Kieran
    McLaughlin, Kieran
    Sezer, Sakir
    2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 279 - 286
  • [40] A Policy-Based Application Service Management in Mobile Cloud Broker
    Kim, Woojoong
    Youn, Chan-Hyun
    CLOUD COMPUTING (CLOUDCOMP 2014), 2015, 142 : 18 - 28