Management of Security in TCP/IP Hosts Using Dedicated Monitoring Applications
Chapter
- 152 Downloads
Abstract
In this paper, we present an approach for detection of vulnerabilities in network systems, using autonomous applications. The main aim is to enable the dynamic, intelligent and autonomous detection of vulnerabilities and exposures in systems and to make it available to network administrators. Our approach will reduce the amount of data sent to network administrators by currently used tools, and therefore present only relevant information preprocessed by our application, which by it self can bring a natural enhancement to the performance of the network overall security.
Key words
Network Security Vulnerabilities. Download
to read the full chapter text
References
- 1.A. Householder, K. Houle, and C. Dougherty, “Computer Attack Trends Challenge Internet Security”, IEEE Computer, Security and Privacy–Supplement, April 2002, pp. 5–7.Google Scholar
- 2.URL: http://www.cert.org Google Scholar
- 3.J. P. Anderson, “Computer Security Threat Monitoring and Surveillance”, James P. Anderson, Co. Fort Washington, PA, 1980.Google Scholar
- 4.R. A. Kemmerer and G. Vigna, “Intrusion Detection: A Brief History and Over-view”, IEEE Computer, Security and Privacy–Supplement, April 2002, pp. 27–29.Google Scholar
- 5.C. Manikopoulos and S. Papavassiliou, “Network Intrusion and Fault Detection: A Statistical Anomaly Approach”, IEEE Communications Magazine, Vol. 40, No. 10, pp. 76–82.Google Scholar
- 6.B. Kim, J.Jang, and T. M. Chung, “Design of Network Security Control Systems for Cooperative Intrusion Detection”, in Information Networking, I. Chong (Ed.), Heidelberg, Springer Verlag, LNCS 2344, 2002, pp. 389–398.Google Scholar
- 7..D. E. Denning, “An Intrusion-Detection Model”, IEEE Transactions on Software Engineering, February 1987.Google Scholar
- 8.G. Quo, J. Rudraraju, R. Modukuri, S. Hariri, “A Framework for Network Vulnerability Analysis”, Proceedings of IASTED International Conference Communication, Internet & Information Technology, November 18–20, 2002, pp. 289–294.Google Scholar
- 9.M. Yi, C. Hwang, “Design of fault tolerante Architecture for Intrusion Detection systems Using Autonomous Agents”, Proceedings of The International Conference on Information Networking (ICOIN’2003), February 12–14, 2003, pp. 913–922.Google Scholar
- 10.URL: http://www.nessus.org.Google Scholar
- 11.URL: http://www.saintcorporation.com Google Scholar
- 12.URL: http://icat.nist.gov Google Scholar
- 13.URL: http://www.ripe.net/perl/whois Google Scholar
- 14.URL:http://www.agentcites.org Google Scholar
- P. Mell, “Understanding the World of your Enemy with I-CAT (Internet-Categorization of Attacks Toolkit)”, in 22nd National Information System Security Conference, October 1999.Google Scholar
- 16.URL: http://www.portsdb.org Google Scholar
- 17.URL: http://www.iana.org Google Scholar
- 18.URL: http://www.cve.mitre.org.Google Scholar
- 19.URL: http://www.fipa.org Google Scholar
- 20.URL: http://www.nist.gov.Google Scholar
Copyright information
© IFIP International Federation for Information Processing 2003