GRID FOR DIGITAL SECURITY (G4DS)

作者: Evangelos Morakis , Michael Pilgermann , Stilianos Vidalis , Andrew Blyth , Jerzy Dobrodziej

DOI:

关键词:

摘要: This paper will discuss G4DS, a technology that make GRIDs attractive to enterprises across all the different fields of computing. It help uptake GRID type architectures and extend their concept from computational GRIDS knowledge GRIDS. The centre gravity G4DS is design implement core allow development applications offering groundbreaking solutions complex problems in information security, which cannot be solved with present technologies. application effectively police cyberspace minimise threats against computing infrastructures. presents IO-IDS greatly enhance functionality Intrusion Detection Systems. 1. Problem Statement In our modern electronic world, securing large-scale environment can seen as problem requires lot resources intensive power. Organisations are forced allocate considerable protecting assets but statistics [7] indicate there no stopping hacking activities. We believe security only achieved through effective policing. One tool for “policing” cyber-world Systems (IDS). Over last decade, IDSs have become increasingly important protection computer networks. Apart other evolutions IDS area such everlasting new detection mechanisms [14], generalisation [15] aggregation [17] alerts, tendency implementing Enterprise has conspicuous. What we need an automated able detect, deter react any illegal cyber activity. Such offered by presented this paper. world. [6] computation manage [10], [19], [16], [10] [5], [8], [18], [2] Defending European IT infrastructure network-based attack involving data analysis sharing [20]. Current technologies do not easily facilitate flow organisational political boundaries. Consequently many organisations face intrusions into systems little same supply chain. There defenders Information Infrastructure (EII) come together form number communities order take actions collectively perpetrator attack, promote culture amongst members these These should secure proactive defending networks ongoing attacks.

参考文章(13)
David M. Piscitello, A. Lyman Chapin, Open Systems Networking: Tcp/Ip and Osi ,(1993)
Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo, A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions recent advances in intrusion detection. pp. 49- 65 ,(2000) , 10.1007/3-540-39945-3_4
Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, State of the Practice of Intrusion Detection Technologies Defense Technical Information Center. ,(2000) , 10.21236/ADA375846
Stephen Hinde, Feature: The law, cybercrime, risk assessment and cyber protection Computers & Security. ,vol. 22, pp. 90- 95 ,(2003) , 10.1016/S0167-4048(03)00203-7
Peter Hoath, Tom Mulhall, Hacking: Motivation and deterrence, part I Computer Fraud & Security. ,vol. 1998, pp. 16- 19 ,(1998) , 10.1016/S1361-3723(97)86611-0
Gary R. Wright, W. Richard Stevens, TCP/IP Illustrated, Volume 2: The Implementation ,(1995)
Stephen Hinde, Special Features: Cyberthreats: Perceptions, Reality and Protection Computers & Security. ,vol. 20, pp. 364- 371 ,(2001) , 10.1016/S0167-4048(01)00503-X
Frank Rees, New perspective on computer hackers Computer Fraud & Security. ,vol. 1996, pp. 8- ,(1996) , 10.1016/S1361-3723(96)90287-0
Dr. Harold Joseph, The threats on the web Computers & Security. ,vol. 16, pp. 7- 10 ,(1997) , 10.1016/S1361-3723(97)83518-X
E Biermann, E Cloete, L.M Venter, Special Features: A comparison of Intrusion Detection systems Computers & Security. ,vol. 20, pp. 676- 683 ,(2001) , 10.1016/S0167-4048(01)00806-9