Presentation 2008-07-25
A Proposal of Intrusion Detection using Third-parties Support
Masakazu Fujii, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Intrusions are one of the most important issues in the current Internet environment. A lot of researchers and companies elaborated countermeasure techniques such as Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). They usually rely on pattern matching. However, considering zero-day attacks and targeted attacks, we should assume that our machines may be corrupted anytime. Therefore we should consider what we can do under this assumption for a next generation security framework. In this paper, we focus on mitigating the spread of corrupted machines in the Internet world, and propose a new intrusion detection methodology using the support of third-parties' machines. In our proposal, when an attacker tries to attack other machine from a corrupted machine that the attacker already intrudes, the other machine notifies it to the corrupted machine's administrator. Since the attack can be noticed by the other machine, the attacker loses the motivation of attacking other machines from corrupted machines.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Intrusion Detection / Policy / Stepping Stone Attack / P2P
Paper # ISEC2008-37
Date of Issue

Conference Information
Committee ISEC
Conference Date 2008/7/17(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Proposal of Intrusion Detection using Third-parties Support
Sub Title (in English)
Keyword(1) Intrusion Detection
Keyword(2) Policy
Keyword(3) Stepping Stone Attack
Keyword(4) P2P
1st Author's Name Masakazu Fujii
1st Author's Affiliation Institute of Systems, Information Technologies & Nanotechnologies()
2nd Author's Name Kenichi Takahashi
2nd Author's Affiliation Institute of Systems, Information Technologies & Nanotechnologies
3rd Author's Name Yoshiaki Hori
3rd Author's Affiliation Department of Computer Science and Communication Engineering, Kyushu University
4th Author's Name Kouichi Sakurai
4th Author's Affiliation Institute of Systems, Information Technologies & Nanotechnologies:Department of Computer Science and Communication Engineering, Kyushu University
Date 2008-07-25
Paper # ISEC2008-37
Volume (vol) vol.108
Number (no) 162
Page pp.pp.-
#Pages 8
Date of Issue