Intrusion Detection for Computational Grids

作者: Alexandre Schulter , Kleber Vieira , Carlos Westphall , Carla Westphall , Sekkaki Abderrahim

DOI: 10.1109/NTMS.2008.ECP.54

关键词:

摘要: Current intrusion detection technology is limited in providing protection against the intrusions that may violate security of computational grids. We present problem grid detection, describe requirements a system to detect them, propose method, and show how it overcomes limitations by integrating typical host computer network attacks with grid-specific user behavior anomalies. This integration evaluated case study makes use simulations prototype implementation.

参考文章(13)
Syed Naqvi, Michel Riguidel, Threat Model for Grid Security Services Advances in Grid Computing - EGC 2005. pp. 1048- 1055 ,(2005) , 10.1007/11508380_107
Ong Tian Choon, A. Samsudin, Grid-based intrusion detection system asia-pacific conference on communications. ,vol. 3, pp. 1028- 1032 ,(2003) , 10.1109/APCC.2003.1274254
Hervé Debar, Marc Dacier, Andreas Wespi, Towards a taxonomy of intrusion-detection systems Computer Networks. ,vol. 31, pp. 805- 822 ,(1999) , 10.1016/S1389-1286(98)00017-6
Ian Foster, Carl Kesselman, The Grid 2: Blueprint for a New Computing Infrastructure The grid : blueprint for a new computing infrastructure / edited by Ian Foster. ,(1998)
Chilukuri K. Mohan, Kishan Mehrotra, Sanjay Ranka, Elements of artificial neural networks ,(1996)
V. Talwar, S. Basu, R. Kumar, An environment for enabling interactive grids high performance distributed computing. pp. 184- 193 ,(2003) , 10.1109/HPDC.2003.1210028
D.E. Denning, An Intrusion-Detection Model IEEE Transactions on Software Engineering. ,vol. 13, pp. 222- 232 ,(1987) , 10.1109/TSE.1987.232894
M. Humphrey, M.R. Thompson, K.R. Jackson, Security for Grids Lawrence Berkeley National Laboratory. ,vol. 93, pp. 644- 652 ,(2005) , 10.1109/JPROC.2004.842776
Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, A performance-based grid intrusion detection system computer software and applications conference. ,vol. 1, pp. 525- 530 ,(2005) , 10.1109/COMPSAC.2005.28
U. Lindqvist, E. Jonsson, How to systematically classify computer security intrusions ieee symposium on security and privacy. pp. 154- 163 ,(1997) , 10.1109/SECPRI.1997.601330