Indra: a peer-to-peer approach to network intrusion detection and prevention
| dc.contributor.author | Janakiraman, Ramaprabhu | deu |
| dc.contributor.author | Waldvogel, Marcel | |
| dc.contributor.author | Zhang, Qi | deu |
| dc.date.accessioned | 2011-03-24T16:10:09Z | deu |
| dc.date.available | 2011-03-24T16:10:09Z | deu |
| dc.date.issued | 2003 | |
| dc.description.abstract | While the spread of the Internet has made the network ubiquitous, it has also rendered networked systems vulnerable to malicious attacks orchestrated from anywhere. These attacks or intrusions typically start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Attackers rely on increasingly sophisticated techniques like using distributed attack sources and obfuscating their network addresses. On the other hand, software that guards against them remains rooted in traditional centralized techniques, presenting an easily-targeted single point of failure. Scalable, distributed network intrusion prevention techniques are sorely needed. We propose Indra---a distributed scheme based on sharing information between trusted peers in a network to guard the network as a whole against intrusion attempts. We present initial ideas for running Indra over a peer-to-peer infrastructure to distribute up-to-date rumors, facts, and trust information in a scalable way. | eng |
| dc.description.version | published | |
| dc.format.mimetype | application/pdf | deu |
| dc.identifier.citation | Also publ. in: Proceedings of IEEE WETICE 2003 Workshop on Enterprise Security, Linz, Austria, June 2003 | deu |
| dc.identifier.citation | Also in: Proceedings of IEEE WETICE 2003 Workshop on Enterprise Security, Linz, Austria, June 2003 | deu |
| dc.identifier.doi | 10.1109/ENABL.2003.1231412 | |
| dc.identifier.ppn | 263516679 | deu |
| dc.identifier.uri | http://kops.uni-konstanz.de/handle/123456789/6201 | |
| dc.language.iso | eng | deu |
| dc.legacy.dateIssued | 2007 | deu |
| dc.rights | terms-of-use | deu |
| dc.rights.uri | https://rightsstatements.org/page/InC/1.0/ | deu |
| dc.subject.ddc | 004 | deu |
| dc.title | Indra: a peer-to-peer approach to network intrusion detection and prevention | eng |
| dc.type | INPROCEEDINGS | deu |
| dspace.entity.type | Publication | |
| kops.citation.bibtex | @inproceedings{Janakiraman2003Indra-6201,
year={2003},
doi={10.1109/ENABL.2003.1231412},
title={Indra: a peer-to-peer approach to network intrusion detection and prevention},
isbn={0-7695-1963-6},
publisher={IEEE Comput. Soc},
booktitle={WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.},
pages={226--231},
author={Janakiraman, Ramaprabhu and Waldvogel, Marcel and Zhang, Qi}
} | |
| kops.citation.iso690 | JANAKIRAMAN, Ramaprabhu, Marcel WALDVOGEL, Qi ZHANG, 2003. Indra: a peer-to-peer approach to network intrusion detection and prevention. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. Linz, Austria. In: WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.. IEEE Comput. Soc, 2003, pp. 226-231. ISBN 0-7695-1963-6. Available under: doi: 10.1109/ENABL.2003.1231412 | deu |
| kops.citation.iso690 | JANAKIRAMAN, Ramaprabhu, Marcel WALDVOGEL, Qi ZHANG, 2003. Indra: a peer-to-peer approach to network intrusion detection and prevention. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. Linz, Austria. In: WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.. IEEE Comput. Soc, 2003, pp. 226-231. ISBN 0-7695-1963-6. Available under: doi: 10.1109/ENABL.2003.1231412 | eng |
| kops.citation.rdf | <rdf:RDF
xmlns:dcterms="http://purl.org/dc/terms/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns:bibo="http://purl.org/ontology/bibo/"
xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
xmlns:foaf="http://xmlns.com/foaf/0.1/"
xmlns:void="http://rdfs.org/ns/void#"
xmlns:xsd="http://www.w3.org/2001/XMLSchema#" >
<rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/6201">
<dc:contributor>Waldvogel, Marcel</dc:contributor>
<dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6201/1/janakiraman03indra.pdf"/>
<dc:creator>Janakiraman, Ramaprabhu</dc:creator>
<dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:09Z</dc:date>
<foaf:homepage rdf:resource="http://localhost:8080/"/>
<dc:language>eng</dc:language>
<dc:contributor>Janakiraman, Ramaprabhu</dc:contributor>
<dcterms:title>Indra: a peer-to-peer approach to network intrusion detection and prevention</dcterms:title>
<void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
<dc:rights>terms-of-use</dc:rights>
<dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/>
<dc:creator>Zhang, Qi</dc:creator>
<dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dc:format>application/pdf</dc:format>
<dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6201"/>
<dc:creator>Waldvogel, Marcel</dc:creator>
<dcterms:issued>2003</dcterms:issued>
<dcterms:bibliographicCitation>Also publ. in: Proceedings of IEEE WETICE 2003 Workshop on Enterprise Security, Linz, Austria, June 2003</dcterms:bibliographicCitation>
<dcterms:bibliographicCitation>Also in: Proceedings of IEEE WETICE 2003 Workshop on Enterprise Security, Linz, Austria, June 2003</dcterms:bibliographicCitation>
<dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6201/1/janakiraman03indra.pdf"/>
<dc:contributor>Zhang, Qi</dc:contributor>
<dcterms:abstract xml:lang="eng">While the spread of the Internet has made the network ubiquitous, it has also rendered networked systems vulnerable to malicious attacks orchestrated from anywhere. These attacks or intrusions typically start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Attackers rely on increasingly sophisticated techniques like using distributed attack sources and obfuscating their network addresses. On the other hand, software that guards against them remains rooted in traditional centralized techniques, presenting an easily-targeted single point of failure. Scalable, distributed network intrusion prevention techniques are sorely needed.<br /><br />We propose Indra---a distributed scheme based on sharing information between trusted peers in a network to guard the network as a whole against intrusion attempts. We present initial ideas for running Indra over a peer-to-peer infrastructure to distribute up-to-date rumors, facts, and trust information in a scalable way.</dcterms:abstract>
<dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:09Z</dcterms:available>
</rdf:Description>
</rdf:RDF> | |
| kops.conferencefield | Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Linz, Austria | deu |
| kops.description.openAccess | openaccessgreen | |
| kops.flag.knbibliography | false | |
| kops.identifier.nbn | urn:nbn:de:bsz:352-opus-24332 | deu |
| kops.location.conference | Linz, Austria | |
| kops.opus.id | 2433 | deu |
| kops.sourcefield | <i>WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.</i>. IEEE Comput. Soc, 2003, pp. 226-231. ISBN 0-7695-1963-6. Available under: doi: 10.1109/ENABL.2003.1231412 | deu |
| kops.sourcefield.plain | WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.. IEEE Comput. Soc, 2003, pp. 226-231. ISBN 0-7695-1963-6. Available under: doi: 10.1109/ENABL.2003.1231412 | deu |
| kops.sourcefield.plain | WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.. IEEE Comput. Soc, 2003, pp. 226-231. ISBN 0-7695-1963-6. Available under: doi: 10.1109/ENABL.2003.1231412 | eng |
| kops.title.conference | Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises | |
| relation.isAuthorOfPublication | 84e1ce62-b720-46ef-b156-ce00a632dd4f | |
| relation.isAuthorOfPublication.latestForDiscovery | 84e1ce62-b720-46ef-b156-ce00a632dd4f | |
| source.bibliographicInfo.fromPage | 226 | |
| source.bibliographicInfo.toPage | 231 | |
| source.identifier.isbn | 0-7695-1963-6 | |
| source.publisher | IEEE Comput. Soc | |
| source.title | WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. |
Dateien
Originalbündel
1 - 1 von 1
Vorschaubild nicht verfügbar
- Name:
- janakiraman03indra.pdf
- Größe:
- 79.96 KB
- Format:
- Adobe Portable Document Format
