International audienceSelf-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets clustered distributed applications. Our approach is based on the structural knowledge of the cluster and of the distributed applications. This knowledge allows to detect known and unknown attacks if an illegal communication channel is used. The current prototype is a self-protected JEE infrastructure (Java 2 Enterprise Edition) with firewall-based intrusion detection. Our prototype induces low-performance penalty for applications
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
The protection of application servers using intrusion detection andother related techniques is studi...
Abstract ■■■ Distributed firewall systems emerged with the proposal of protecting individual hosts a...
International audienceSelf-protection refers to the ability for a system to detect illegal behaviors...
Abstract — The complexity of today's distributed computing environment is such that the presenc...
International audienceThe complexity of today's distributed computing environments is such that the ...
Abstract. The complexity of today’s distributed computing environ-ments is such that the presence of...
The complexity of today's distributed computing environment is such that the presence of bugs a...
The complexity of today’s distributed computing environment is such that the presence of bugs and se...
The community and tools for illegal access are getting well organized and sophisticated. However, wi...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
The complexity of modern network architectures and the epidemic diffusion of malware require collabo...
An Intrusion Detection System (IDS) is a software application that mon- itor a corporate network or...
Abstract. The complexity of modern network architectures and the epi-demic diffusion of malware requ...
Over the last fifteen years the world has experienced a wide variety of computer threats and general...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
The protection of application servers using intrusion detection andother related techniques is studi...
Abstract ■■■ Distributed firewall systems emerged with the proposal of protecting individual hosts a...
International audienceSelf-protection refers to the ability for a system to detect illegal behaviors...
Abstract — The complexity of today's distributed computing environment is such that the presenc...
International audienceThe complexity of today's distributed computing environments is such that the ...
Abstract. The complexity of today’s distributed computing environ-ments is such that the presence of...
The complexity of today's distributed computing environment is such that the presence of bugs a...
The complexity of today’s distributed computing environment is such that the presence of bugs and se...
The community and tools for illegal access are getting well organized and sophisticated. However, wi...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
The complexity of modern network architectures and the epidemic diffusion of malware require collabo...
An Intrusion Detection System (IDS) is a software application that mon- itor a corporate network or...
Abstract. The complexity of modern network architectures and the epi-demic diffusion of malware requ...
Over the last fifteen years the world has experienced a wide variety of computer threats and general...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
The protection of application servers using intrusion detection andother related techniques is studi...
Abstract ■■■ Distributed firewall systems emerged with the proposal of protecting individual hosts a...