Online monitoring and analysis for self-protection against network attacks
In this paper, we present an online monitoring and analysis framework to achieve self-protection against a wide range of network attacks. Our approach uses the software agents to online monitor several attributes to characterize the state of any network or computing resource as normal, uncertain, or...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 325 |
---|---|
container_issue | |
container_start_page | 324 |
container_title | |
container_volume | |
creator | Guangzhi Qu Hariri, S. Jangiti, S. Rudraraju, J. Seungchan Oh Fayssal, S. Guangsen Zhang Parashar, M. |
description | In this paper, we present an online monitoring and analysis framework to achieve self-protection against a wide range of network attacks. Our approach uses the software agents to online monitor several attributes to characterize the state of any network or computing resource as normal, uncertain, or abnormal. The software agents execute the appropriate recovery mechanisms once they determine that a service, and/or a network device is operating abnormally. We have developed a test bed to demonstrate and validate our approach to protect against several well-known attacks. |
doi_str_mv | 10.1109/ICAC.2004.1301398 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1301398</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1301398</ieee_id><sourcerecordid>1301398</sourcerecordid><originalsourceid>FETCH-LOGICAL-i88t-8842632f177875e5864ea2cad28eb28b5943d14af30b3f2f005a1956360f1e943</originalsourceid><addsrcrecordid>eNotj8tqwzAURAWl0JL6A0o3-gGnelrSspi-QiCb7MO1fRXUOFKQBCV_X0MzMMziwDBDyDNna86Ze_3u3_q1YEytuWRcOntHGmcsM53TgnOlH0hTyg9bJJ20wjySzS7OISI9pxhqyiEeKcRpMczXEgr1KdOCs28vOVUca0iRwhFCLJVGrL8pnyjUCuOpPJF7D3PB5pYrsv943_df7Xb3uSzbtsHa2lqrRCeF58ZYo1HbTiGIESZhcRB20E7JiSvwkg3SC8-YBu50JzvmOS5wRV7-awMiHi45nCFfD7fD8g_YkUuL</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Online monitoring and analysis for self-protection against network attacks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Guangzhi Qu ; Hariri, S. ; Jangiti, S. ; Rudraraju, J. ; Seungchan Oh ; Fayssal, S. ; Guangsen Zhang ; Parashar, M.</creator><creatorcontrib>Guangzhi Qu ; Hariri, S. ; Jangiti, S. ; Rudraraju, J. ; Seungchan Oh ; Fayssal, S. ; Guangsen Zhang ; Parashar, M.</creatorcontrib><description>In this paper, we present an online monitoring and analysis framework to achieve self-protection against a wide range of network attacks. Our approach uses the software agents to online monitor several attributes to characterize the state of any network or computing resource as normal, uncertain, or abnormal. The software agents execute the appropriate recovery mechanisms once they determine that a service, and/or a network device is operating abnormally. We have developed a test bed to demonstrate and validate our approach to protect against several well-known attacks.</description><identifier>ISBN: 9780769521145</identifier><identifier>ISBN: 0769521142</identifier><identifier>DOI: 10.1109/ICAC.2004.1301398</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer networks ; Fault trees ; IP networks ; Laboratories ; Monitoring ; Protection ; Software agents ; Software systems ; System software ; Testing</subject><ispartof>International Conference on Autonomic Computing, 2004. Proceedings, 2004, p.324-325</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1301398$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1301398$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Guangzhi Qu</creatorcontrib><creatorcontrib>Hariri, S.</creatorcontrib><creatorcontrib>Jangiti, S.</creatorcontrib><creatorcontrib>Rudraraju, J.</creatorcontrib><creatorcontrib>Seungchan Oh</creatorcontrib><creatorcontrib>Fayssal, S.</creatorcontrib><creatorcontrib>Guangsen Zhang</creatorcontrib><creatorcontrib>Parashar, M.</creatorcontrib><title>Online monitoring and analysis for self-protection against network attacks</title><title>International Conference on Autonomic Computing, 2004. Proceedings</title><addtitle>ICAC</addtitle><description>In this paper, we present an online monitoring and analysis framework to achieve self-protection against a wide range of network attacks. Our approach uses the software agents to online monitor several attributes to characterize the state of any network or computing resource as normal, uncertain, or abnormal. The software agents execute the appropriate recovery mechanisms once they determine that a service, and/or a network device is operating abnormally. We have developed a test bed to demonstrate and validate our approach to protect against several well-known attacks.</description><subject>Computer networks</subject><subject>Fault trees</subject><subject>IP networks</subject><subject>Laboratories</subject><subject>Monitoring</subject><subject>Protection</subject><subject>Software agents</subject><subject>Software systems</subject><subject>System software</subject><subject>Testing</subject><isbn>9780769521145</isbn><isbn>0769521142</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj8tqwzAURAWl0JL6A0o3-gGnelrSspi-QiCb7MO1fRXUOFKQBCV_X0MzMMziwDBDyDNna86Ze_3u3_q1YEytuWRcOntHGmcsM53TgnOlH0hTyg9bJJ20wjySzS7OISI9pxhqyiEeKcRpMczXEgr1KdOCs28vOVUca0iRwhFCLJVGrL8pnyjUCuOpPJF7D3PB5pYrsv943_df7Xb3uSzbtsHa2lqrRCeF58ZYo1HbTiGIESZhcRB20E7JiSvwkg3SC8-YBu50JzvmOS5wRV7-awMiHi45nCFfD7fD8g_YkUuL</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Guangzhi Qu</creator><creator>Hariri, S.</creator><creator>Jangiti, S.</creator><creator>Rudraraju, J.</creator><creator>Seungchan Oh</creator><creator>Fayssal, S.</creator><creator>Guangsen Zhang</creator><creator>Parashar, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>Online monitoring and analysis for self-protection against network attacks</title><author>Guangzhi Qu ; Hariri, S. ; Jangiti, S. ; Rudraraju, J. ; Seungchan Oh ; Fayssal, S. ; Guangsen Zhang ; Parashar, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i88t-8842632f177875e5864ea2cad28eb28b5943d14af30b3f2f005a1956360f1e943</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Computer networks</topic><topic>Fault trees</topic><topic>IP networks</topic><topic>Laboratories</topic><topic>Monitoring</topic><topic>Protection</topic><topic>Software agents</topic><topic>Software systems</topic><topic>System software</topic><topic>Testing</topic><toplevel>online_resources</toplevel><creatorcontrib>Guangzhi Qu</creatorcontrib><creatorcontrib>Hariri, S.</creatorcontrib><creatorcontrib>Jangiti, S.</creatorcontrib><creatorcontrib>Rudraraju, J.</creatorcontrib><creatorcontrib>Seungchan Oh</creatorcontrib><creatorcontrib>Fayssal, S.</creatorcontrib><creatorcontrib>Guangsen Zhang</creatorcontrib><creatorcontrib>Parashar, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Guangzhi Qu</au><au>Hariri, S.</au><au>Jangiti, S.</au><au>Rudraraju, J.</au><au>Seungchan Oh</au><au>Fayssal, S.</au><au>Guangsen Zhang</au><au>Parashar, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Online monitoring and analysis for self-protection against network attacks</atitle><btitle>International Conference on Autonomic Computing, 2004. Proceedings</btitle><stitle>ICAC</stitle><date>2004</date><risdate>2004</risdate><spage>324</spage><epage>325</epage><pages>324-325</pages><isbn>9780769521145</isbn><isbn>0769521142</isbn><abstract>In this paper, we present an online monitoring and analysis framework to achieve self-protection against a wide range of network attacks. Our approach uses the software agents to online monitor several attributes to characterize the state of any network or computing resource as normal, uncertain, or abnormal. The software agents execute the appropriate recovery mechanisms once they determine that a service, and/or a network device is operating abnormally. We have developed a test bed to demonstrate and validate our approach to protect against several well-known attacks.</abstract><pub>IEEE</pub><doi>10.1109/ICAC.2004.1301398</doi><tpages>2</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769521145 |
ispartof | International Conference on Autonomic Computing, 2004. Proceedings, 2004, p.324-325 |
issn | |
language | eng |
recordid | cdi_ieee_primary_1301398 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computer networks Fault trees IP networks Laboratories Monitoring Protection Software agents Software systems System software Testing |
title | Online monitoring and analysis for self-protection against network attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T05%3A18%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Online%20monitoring%20and%20analysis%20for%20self-protection%20against%20network%20attacks&rft.btitle=International%20Conference%20on%20Autonomic%20Computing,%202004.%20Proceedings&rft.au=Guangzhi%20Qu&rft.date=2004&rft.spage=324&rft.epage=325&rft.pages=324-325&rft.isbn=9780769521145&rft.isbn_list=0769521142&rft_id=info:doi/10.1109/ICAC.2004.1301398&rft_dat=%3Cieee_6IE%3E1301398%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1301398&rfr_iscdi=true |