Indra: a peer-to-peer approach to network intrusion detection and prevention

dc.contributor.authorJanakiraman, Ramaprabhudeu
dc.contributor.authorWaldvogel, Marcel
dc.contributor.authorZhang, Qideu
dc.date.accessioned2011-03-24T16:10:09Zdeu
dc.date.available2011-03-24T16:10:09Zdeu
dc.date.issued2003
dc.description.abstractWhile the spread of the Internet has made the network ubiquitous, it has also rendered networked systems vulnerable to malicious attacks orchestrated from anywhere. These attacks or intrusions typically start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Attackers rely on increasingly sophisticated techniques like using distributed attack sources and obfuscating their network addresses. On the other hand, software that guards against them remains rooted in traditional centralized techniques, presenting an easily-targeted single point of failure. Scalable, distributed network intrusion prevention techniques are sorely needed.

We propose Indra---a distributed scheme based on sharing information between trusted peers in a network to guard the network as a whole against intrusion attempts. We present initial ideas for running Indra over a peer-to-peer infrastructure to distribute up-to-date rumors, facts, and trust information in a scalable way.
eng
dc.description.versionpublished
dc.format.mimetypeapplication/pdfdeu
dc.identifier.citationAlso publ. in: Proceedings of IEEE WETICE 2003 Workshop on Enterprise Security, Linz, Austria, June 2003deu
dc.identifier.citationAlso in: Proceedings of IEEE WETICE 2003 Workshop on Enterprise Security, Linz, Austria, June 2003deu
dc.identifier.doi10.1109/ENABL.2003.1231412
dc.identifier.ppn263516679deu
dc.identifier.urihttp://kops.uni-konstanz.de/handle/123456789/6201
dc.language.isoengdeu
dc.legacy.dateIssued2007deu
dc.rightsterms-of-usedeu
dc.rights.urihttps://rightsstatements.org/page/InC/1.0/deu
dc.subject.ddc004deu
dc.titleIndra: a peer-to-peer approach to network intrusion detection and preventioneng
dc.typeINPROCEEDINGSdeu
dspace.entity.typePublication
kops.citation.bibtex
@inproceedings{Janakiraman2003Indra-6201,
  year={2003},
  doi={10.1109/ENABL.2003.1231412},
  title={Indra: a peer-to-peer approach to network intrusion detection and prevention},
  isbn={0-7695-1963-6},
  publisher={IEEE Comput. Soc},
  booktitle={WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.},
  pages={226--231},
  author={Janakiraman, Ramaprabhu and Waldvogel, Marcel and Zhang, Qi}
}
kops.citation.iso690JANAKIRAMAN, Ramaprabhu, Marcel WALDVOGEL, Qi ZHANG, 2003. Indra: a peer-to-peer approach to network intrusion detection and prevention. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. Linz, Austria. In: WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.. IEEE Comput. Soc, 2003, pp. 226-231. ISBN 0-7695-1963-6. Available under: doi: 10.1109/ENABL.2003.1231412deu
kops.citation.iso690JANAKIRAMAN, Ramaprabhu, Marcel WALDVOGEL, Qi ZHANG, 2003. Indra: a peer-to-peer approach to network intrusion detection and prevention. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. Linz, Austria. In: WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.. IEEE Comput. Soc, 2003, pp. 226-231. ISBN 0-7695-1963-6. Available under: doi: 10.1109/ENABL.2003.1231412eng
kops.citation.rdf
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/6201">
    <dc:contributor>Waldvogel, Marcel</dc:contributor>
    <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6201/1/janakiraman03indra.pdf"/>
    <dc:creator>Janakiraman, Ramaprabhu</dc:creator>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:09Z</dc:date>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:language>eng</dc:language>
    <dc:contributor>Janakiraman, Ramaprabhu</dc:contributor>
    <dcterms:title>Indra: a peer-to-peer approach to network intrusion detection and prevention</dcterms:title>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dc:rights>terms-of-use</dc:rights>
    <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/>
    <dc:creator>Zhang, Qi</dc:creator>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:format>application/pdf</dc:format>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6201"/>
    <dc:creator>Waldvogel, Marcel</dc:creator>
    <dcterms:issued>2003</dcterms:issued>
    <dcterms:bibliographicCitation>Also publ. in: Proceedings of IEEE WETICE 2003 Workshop on Enterprise Security, Linz, Austria, June 2003</dcterms:bibliographicCitation>
    <dcterms:bibliographicCitation>Also in: Proceedings of IEEE WETICE 2003 Workshop on Enterprise Security, Linz, Austria, June 2003</dcterms:bibliographicCitation>
    <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6201/1/janakiraman03indra.pdf"/>
    <dc:contributor>Zhang, Qi</dc:contributor>
    <dcterms:abstract xml:lang="eng">While the spread of the Internet has made the network ubiquitous, it has also rendered networked systems vulnerable to malicious attacks orchestrated from anywhere. These attacks or intrusions typically start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Attackers rely on increasingly sophisticated techniques like using distributed attack sources and obfuscating their network addresses. On the other hand, software that guards against them remains rooted in traditional centralized techniques, presenting an easily-targeted single point of failure. Scalable, distributed network intrusion prevention techniques are sorely needed.&lt;br /&gt;&lt;br /&gt;We propose Indra---a distributed scheme based on sharing information between trusted peers in a network to guard the network as a whole against intrusion attempts. We present initial ideas for running Indra over a peer-to-peer infrastructure to distribute up-to-date rumors, facts, and trust information in a scalable way.</dcterms:abstract>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:09Z</dcterms:available>
  </rdf:Description>
</rdf:RDF>
kops.conferencefieldTwelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Linz, Austriadeu
kops.description.openAccessopenaccessgreen
kops.flag.knbibliographyfalse
kops.identifier.nbnurn:nbn:de:bsz:352-opus-24332deu
kops.location.conferenceLinz, Austria
kops.opus.id2433deu
kops.sourcefield<i>WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.</i>. IEEE Comput. Soc, 2003, pp. 226-231. ISBN 0-7695-1963-6. Available under: doi: 10.1109/ENABL.2003.1231412deu
kops.sourcefield.plainWET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.. IEEE Comput. Soc, 2003, pp. 226-231. ISBN 0-7695-1963-6. Available under: doi: 10.1109/ENABL.2003.1231412deu
kops.sourcefield.plainWET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.. IEEE Comput. Soc, 2003, pp. 226-231. ISBN 0-7695-1963-6. Available under: doi: 10.1109/ENABL.2003.1231412eng
kops.title.conferenceTwelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
relation.isAuthorOfPublication84e1ce62-b720-46ef-b156-ce00a632dd4f
relation.isAuthorOfPublication.latestForDiscovery84e1ce62-b720-46ef-b156-ce00a632dd4f
source.bibliographicInfo.fromPage226
source.bibliographicInfo.toPage231
source.identifier.isbn0-7695-1963-6
source.publisherIEEE Comput. Soc
source.titleWET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.

Dateien

Originalbündel

Gerade angezeigt 1 - 1 von 1
Vorschaubild nicht verfügbar
Name:
janakiraman03indra.pdf
Größe:
79.96 KB
Format:
Adobe Portable Document Format
janakiraman03indra.pdf
janakiraman03indra.pdfGröße: 79.96 KBDownloads: 1067