We describe the implementation and experimental evaluation of two distributed systems integrated with on-line monitoring intrusion removal techniques. The scheduling of processes at a site is accomplished using the round-robin mechanism. The communication is carried out using a logical token-ring protocol in one system, and a point-to-point protocol in the other. By registering the monitoring activities, such as the instrumentation code in the source program and monitoring processes, monitoring intrusion can be removed in the systems automatically. Experiments were conducted to evaluate the intrinsic overhead of the systems, that is, the cost of providing an intrusion removal capability, and the effectiveness of the systems to remove monito...
Abstract:- Distributed network intrusion detection systems which incorporate tens, hundreds, even th...
Intrusion detection is a significant focus of research in the security of computer systems and netwo...
A novel approach of structuring mission-critical systems with an emphasis on intrusion tolerance is ...
Distributed programs are often instrumented for collecting information to assist in analyzing the be...
Distributed programs are often instrumented for collecting information to assist in analyzing the be...
The protection of application servers using intrusion detection andother related techniques is studi...
Part 1: Intrusion DetectionInternational audienceAlthough security issues are now addressed during t...
Host-based intrusion-prevention systems are currently popular technologies which try to prevent expl...
Abstract: Virtual-machine logging and replay enables system administrators to analyze intrusions mor...
The proliferation of wideband connections while opening the market to a wealth of Web based applicat...
Abstract: Large Critical Complex Infrastructures are increasingly dependent on IP networks. Reliabil...
This paper describes a set of metrics that will help administrators of distributed, real-time (clust...
Abstract: Intrusion detection systems have proved to be an effective instrument for protecting compu...
Network access has been an essential resource in most businesses. This allows expensive supplies suc...
Computer networks are vulnerable to attacks from outside threats. Intrusion detection systems are us...
Abstract:- Distributed network intrusion detection systems which incorporate tens, hundreds, even th...
Intrusion detection is a significant focus of research in the security of computer systems and netwo...
A novel approach of structuring mission-critical systems with an emphasis on intrusion tolerance is ...
Distributed programs are often instrumented for collecting information to assist in analyzing the be...
Distributed programs are often instrumented for collecting information to assist in analyzing the be...
The protection of application servers using intrusion detection andother related techniques is studi...
Part 1: Intrusion DetectionInternational audienceAlthough security issues are now addressed during t...
Host-based intrusion-prevention systems are currently popular technologies which try to prevent expl...
Abstract: Virtual-machine logging and replay enables system administrators to analyze intrusions mor...
The proliferation of wideband connections while opening the market to a wealth of Web based applicat...
Abstract: Large Critical Complex Infrastructures are increasingly dependent on IP networks. Reliabil...
This paper describes a set of metrics that will help administrators of distributed, real-time (clust...
Abstract: Intrusion detection systems have proved to be an effective instrument for protecting compu...
Network access has been an essential resource in most businesses. This allows expensive supplies suc...
Computer networks are vulnerable to attacks from outside threats. Intrusion detection systems are us...
Abstract:- Distributed network intrusion detection systems which incorporate tens, hundreds, even th...
Intrusion detection is a significant focus of research in the security of computer systems and netwo...
A novel approach of structuring mission-critical systems with an emphasis on intrusion tolerance is ...