Advertisement

Management of Security in TCP/IP Hosts Using Dedicated Monitoring Applications

  • Rui Costa Cardoso
  • Mário M. Freire
Chapter
  • 152 Downloads
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 133)

Abstract

In this paper, we present an approach for detection of vulnerabilities in network systems, using autonomous applications. The main aim is to enable the dynamic, intelligent and autonomous detection of vulnerabilities and exposures in systems and to make it available to network administrators. Our approach will reduce the amount of data sent to network administrators by currently used tools, and therefore present only relevant information preprocessed by our application, which by it self can bring a natural enhancement to the performance of the network overall security.

Key words

Network Security Vulnerabilities. 

References

  1. 1.
    A. Householder, K. Houle, and C. Dougherty, “Computer Attack Trends Challenge Internet Security”, IEEE Computer, Security and Privacy–Supplement, April 2002, pp. 5–7.Google Scholar
  2. 2.
    URL: http://www.cert.org Google Scholar
  3. 3.
    J. P. Anderson, “Computer Security Threat Monitoring and Surveillance”, James P. Anderson, Co. Fort Washington, PA, 1980.Google Scholar
  4. 4.
    R. A. Kemmerer and G. Vigna, “Intrusion Detection: A Brief History and Over-view”, IEEE Computer, Security and Privacy–Supplement, April 2002, pp. 27–29.Google Scholar
  5. 5.
    C. Manikopoulos and S. Papavassiliou, “Network Intrusion and Fault Detection: A Statistical Anomaly Approach”, IEEE Communications Magazine, Vol. 40, No. 10, pp. 76–82.Google Scholar
  6. 6.
    B. Kim, J.Jang, and T. M. Chung, “Design of Network Security Control Systems for Cooperative Intrusion Detection”, in Information Networking, I. Chong (Ed.), Heidelberg, Springer Verlag, LNCS 2344, 2002, pp. 389–398.Google Scholar
  7. 7..
    D. E. Denning, “An Intrusion-Detection Model”, IEEE Transactions on Software Engineering, February 1987.Google Scholar
  8. 8.
    G. Quo, J. Rudraraju, R. Modukuri, S. Hariri, “A Framework for Network Vulnerability Analysis”, Proceedings of IASTED International Conference Communication, Internet & Information Technology, November 18–20, 2002, pp. 289–294.Google Scholar
  9. 9.
    M. Yi, C. Hwang, “Design of fault tolerante Architecture for Intrusion Detection systems Using Autonomous Agents”, Proceedings of The International Conference on Information Networking (ICOIN’2003), February 12–14, 2003, pp. 913–922.Google Scholar
  10. 10.
    URL: http://www.nessus.org.Google Scholar
  11. 11.
    URL: http://www.saintcorporation.com Google Scholar
  12. 12.
    URL: http://icat.nist.gov Google Scholar
  13. 13.
    URL: http://www.ripe.net/perl/whois Google Scholar
  14. 14.
    URL:http://www.agentcites.org Google Scholar
  15. P. Mell, “Understanding the World of your Enemy with I-CAT (Internet-Categorization of Attacks Toolkit)”, in 22nd National Information System Security Conference, October 1999.Google Scholar
  16. 16.
    URL: http://www.portsdb.org Google Scholar
  17. 17.
    URL: http://www.iana.org Google Scholar
  18. 18.
    URL: http://www.cve.mitre.org.Google Scholar
  19. 19.
    URL: http://www.fipa.org Google Scholar
  20. 20.
    URL: http://www.nist.gov.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2003

Authors and Affiliations

  • Rui Costa Cardoso
    • 1
  • Mário M. Freire
    • 1
  1. 1.Networks and Multimedia Group, Institute of Telecommunications- Covilhã Lab Department of InformaticsUniversity of Beira InteriorCovilhãPortugal

Personalised recommendations