Incremental security in open, untrusted networks

作者: A. Hutchison , M. Welz

DOI: 10.1109/FTDCS.1999.818798

关键词: Intrusion detection systemComputer securityProcess (engineering)Computer scienceHost-based intrusion detection systemOrder (exchange)Network Access ControlVulnerability (computing)Network securityComputer networkAnomaly detection

摘要: In this paper we identify a number of security problems encountered in open, untrusted networks and motivate why some these are going to remain with us for the foreseeable future. order reduce system vulnerability such environments, suggest that network services should provide second line defense catch those attackers who not excluded by first line-the conventional signon process. Part fallback position could adapt anomaly detection (a concept borrowed from intrusion systems) means gradually continuously authenticating users modulating their access rights accordingly.

参考文章(3)
Terran Lane, Carla E. Brodley, Temporal sequence learning and data reduction for anomaly detection computer and communications security. pp. 150- 158 ,(1998) , 10.1145/288090.288122
Anil Somayaji, Steven Hofmeyr, Stephanie Forrest, Principles of a computer immune system new security paradigms workshop. pp. 75- 82 ,(1998) , 10.1145/283699.283742
E. S. Moreira, A. C. P. L. F. Carvalho, A. M. Cansian, J. M. Bonifacio, An adaptive intrusion detection system using neural networks international conference on information security. pp. 418- 428 ,(1998)