A security framework for detecting enterprise-wide attacks in computer [PDF]

May 29, 2014 - Abstract. An integrated security framework is proposed for detecting enterprise-wide network attacks. The

8 downloads 22 Views 40KB Size

Recommend Stories


Using embedded sensors for detecting network attacks
Be who you needed when you were younger. Anonymous

Attacks on computer systems
I cannot do all the good that the world needs, but the world needs all the good that I can do. Jana

Modeling tools for detecting DoS attacks in WSNs
The only limits you see are the ones you impose on yourself. Dr. Wayne Dyer

A Common Language for Computer Security Incidents
When you do things from your soul, you feel a river moving in you, a joy. Rumi

A Framework for Aviation Cyber Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

COMPUTER SECURITY
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

Practical Computer Security for Writers
Don't ruin a good today by thinking about a bad yesterday. Let it go. Anonymous

Safe Staging for Computer Security
What we think, what we become. Buddha

Eavesdropping attacks on computer displays
In the end only three things matter: how much you loved, how gently you lived, and how gracefully you

Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities
Be like the sun for grace and mercy. Be like the night to cover others' faults. Be like running water

Idea Transcript


Jump to main menu navigation [j] Jump to page content [k]

Research at Kingston University LoginHome

About Browse by Year Browse by Research Area Browse by Faculty Browse by Kingston Author Search Help

A security framework for detecting enterprise-wide attacks in computer networks Onwubiko, Cyril (2008) A security framework for detecting enterprise-wide attacks in computer networks. (PhD thesis), Kingston University. Full text not available from this archive. Official URL: http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos...

Abstract An integrated security framework is proposed for detecting enterprise-wide network attacks. The proposed framework defines three types of components, namely, sensor, analysis and response. Sensor components gather evidence about security attacks. Analysis components correlate and combine pieces of attack evidence gathered by sensors, in order to detect attacks perceived on the network. Response components execute recommended responses and can be configured to assist humans in executing security countermeasures. Both schematic and formal descriptions of the framework and its components are provided and discussed. General and specific requirements of each component are outlined. To integrate components of the framework together, a lightweight signalling mechanism referred to as "security spaces" is proposed. A security space is a type of "tuple space" that allows sensor, analysis and response components to connect, contribute and communicate security related information. Its application to distributed sensor, and federated sensor environments is described. The detection of enterprise-wide attacks targeting computer networks is accomplished by distributing sensors across the network to collate evidence of perceived attacks, which are communicated to the analysis component for further investigation. In the analysis, a novel approach in data fusion is applied. This approach is underpinned by the Dempster-Shafer theory of evidence that is utilised to collectively combine pieces of attack evidence gathered by the sensors. The fusion of sensor evidence assists to provide accurate detection of attacks perceived on the entire network. Further, to assist security administrators to visualise and mitigate perceived attacks, graph theory and graph matching algorithms are employed in the analysis. Hence, a graph model - pattern activity graph - is proposed and investigated in representing security attacks perceived on the network. Both graph isomorphism and subgraph iso-morphism are used to compare attack graph templates to data graphs obtained from security events. To validate the objectives of this research, a series of experiments were conducted on a testbed

network, where live network traffic was monitored. A dataset comprising background data and attack data was gathered. Background data is normal data obtained by monitoring the testbed network. Attack data was generated through the attacks conducted on the monitored testbed LAN. The attacks were primarily network scans, network worms, web attacks, policy violations, and stealthy network scans attacks. Item Type: Thesis (PhD) Physical Location: This item is held in stock at Kingston University Library. Research Area:

Communication, cultural and media studies Computer science and informatics

Faculty, School or Research Centre: Faculty of Computing, Information Systems and Mathematics (until 2011) Depositing User: Automatic Import Agent Date Deposited: 09 Sep 2011 21:38 Last Modified: 29 May 2014 10:43 URI: http://eprints.kingston.ac.uk/id/eprint/20301

Actions (Repository Editors) Item Control Page Disclaimer Copyright Freedom of Information Privacy Policy Cookies

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.