This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where info...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
Intrusion detection is the problem of identifying unauthorized use, misuse, and abuse of computer sy...
The study of providing security in computer networks is a rapidly growing area of interest because t...
Abstract—This paper presents a new framework for dis-tributed intrusion detection based on taint mar...
International audienceThis article presents a novel approach to confidentiality violation detection ...
Abstract Evidence of attacks against a network and its resources is often scattered over several hos...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Distributed intrustion detection systems detect attacks on computer systems by analyzing data aggreg...
Modern organisations rely intensively on information and communicationtechnology infrastructures. Su...
This paper describes some attack and intrusion detection elements of a security architecture for dis...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
Part 1: Intrusion DetectionInternational audienceAlthough security issues are now addressed during t...
The proliferation of wideband connections while opening the market to a wealth of new web based appl...
With the increasing requirements of fast response and privacy protection, how to detect network intr...
Abstract—Using collaborative intrusion detection to sense network intrusions comes at a price of han...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
Intrusion detection is the problem of identifying unauthorized use, misuse, and abuse of computer sy...
The study of providing security in computer networks is a rapidly growing area of interest because t...
Abstract—This paper presents a new framework for dis-tributed intrusion detection based on taint mar...
International audienceThis article presents a novel approach to confidentiality violation detection ...
Abstract Evidence of attacks against a network and its resources is often scattered over several hos...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Distributed intrustion detection systems detect attacks on computer systems by analyzing data aggreg...
Modern organisations rely intensively on information and communicationtechnology infrastructures. Su...
This paper describes some attack and intrusion detection elements of a security architecture for dis...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
Part 1: Intrusion DetectionInternational audienceAlthough security issues are now addressed during t...
The proliferation of wideband connections while opening the market to a wealth of new web based appl...
With the increasing requirements of fast response and privacy protection, how to detect network intr...
Abstract—Using collaborative intrusion detection to sense network intrusions comes at a price of han...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
Intrusion detection is the problem of identifying unauthorized use, misuse, and abuse of computer sy...
The study of providing security in computer networks is a rapidly growing area of interest because t...