Presentation | 2008-07-25 A Proposal of Intrusion Detection using Third-parties Support Masakazu Fujii, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Intrusions are one of the most important issues in the current Internet environment. A lot of researchers and companies elaborated countermeasure techniques such as Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). They usually rely on pattern matching. However, considering zero-day attacks and targeted attacks, we should assume that our machines may be corrupted anytime. Therefore we should consider what we can do under this assumption for a next generation security framework. In this paper, we focus on mitigating the spread of corrupted machines in the Internet world, and propose a new intrusion detection methodology using the support of third-parties' machines. In our proposal, when an attacker tries to attack other machine from a corrupted machine that the attacker already intrudes, the other machine notifies it to the corrupted machine's administrator. Since the attack can be noticed by the other machine, the attacker loses the motivation of attacking other machines from corrupted machines. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Intrusion Detection / Policy / Stepping Stone Attack / P2P |
Paper # | ISEC2008-37 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2008/7/17(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Proposal of Intrusion Detection using Third-parties Support |
Sub Title (in English) | |
Keyword(1) | Intrusion Detection |
Keyword(2) | Policy |
Keyword(3) | Stepping Stone Attack |
Keyword(4) | P2P |
1st Author's Name | Masakazu Fujii |
1st Author's Affiliation | Institute of Systems, Information Technologies & Nanotechnologies() |
2nd Author's Name | Kenichi Takahashi |
2nd Author's Affiliation | Institute of Systems, Information Technologies & Nanotechnologies |
3rd Author's Name | Yoshiaki Hori |
3rd Author's Affiliation | Department of Computer Science and Communication Engineering, Kyushu University |
4th Author's Name | Kouichi Sakurai |
4th Author's Affiliation | Institute of Systems, Information Technologies & Nanotechnologies:Department of Computer Science and Communication Engineering, Kyushu University |
Date | 2008-07-25 |
Paper # | ISEC2008-37 |
Volume (vol) | vol.108 |
Number (no) | 162 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |