Online monitoring and analysis for self-protection against network attacks

In this paper, we present an online monitoring and analysis framework to achieve self-protection against a wide range of network attacks. Our approach uses the software agents to online monitor several attributes to characterize the state of any network or computing resource as normal, uncertain, or...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Guangzhi Qu, Hariri, S., Jangiti, S., Rudraraju, J., Seungchan Oh, Fayssal, S., Guangsen Zhang, Parashar, M.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 325
container_issue
container_start_page 324
container_title
container_volume
creator Guangzhi Qu
Hariri, S.
Jangiti, S.
Rudraraju, J.
Seungchan Oh
Fayssal, S.
Guangsen Zhang
Parashar, M.
description In this paper, we present an online monitoring and analysis framework to achieve self-protection against a wide range of network attacks. Our approach uses the software agents to online monitor several attributes to characterize the state of any network or computing resource as normal, uncertain, or abnormal. The software agents execute the appropriate recovery mechanisms once they determine that a service, and/or a network device is operating abnormally. We have developed a test bed to demonstrate and validate our approach to protect against several well-known attacks.
doi_str_mv 10.1109/ICAC.2004.1301398
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1301398</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1301398</ieee_id><sourcerecordid>1301398</sourcerecordid><originalsourceid>FETCH-LOGICAL-i88t-8842632f177875e5864ea2cad28eb28b5943d14af30b3f2f005a1956360f1e943</originalsourceid><addsrcrecordid>eNotj8tqwzAURAWl0JL6A0o3-gGnelrSspi-QiCb7MO1fRXUOFKQBCV_X0MzMMziwDBDyDNna86Ze_3u3_q1YEytuWRcOntHGmcsM53TgnOlH0hTyg9bJJ20wjySzS7OISI9pxhqyiEeKcRpMczXEgr1KdOCs28vOVUca0iRwhFCLJVGrL8pnyjUCuOpPJF7D3PB5pYrsv943_df7Xb3uSzbtsHa2lqrRCeF58ZYo1HbTiGIESZhcRB20E7JiSvwkg3SC8-YBu50JzvmOS5wRV7-awMiHi45nCFfD7fD8g_YkUuL</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Online monitoring and analysis for self-protection against network attacks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Guangzhi Qu ; Hariri, S. ; Jangiti, S. ; Rudraraju, J. ; Seungchan Oh ; Fayssal, S. ; Guangsen Zhang ; Parashar, M.</creator><creatorcontrib>Guangzhi Qu ; Hariri, S. ; Jangiti, S. ; Rudraraju, J. ; Seungchan Oh ; Fayssal, S. ; Guangsen Zhang ; Parashar, M.</creatorcontrib><description>In this paper, we present an online monitoring and analysis framework to achieve self-protection against a wide range of network attacks. Our approach uses the software agents to online monitor several attributes to characterize the state of any network or computing resource as normal, uncertain, or abnormal. The software agents execute the appropriate recovery mechanisms once they determine that a service, and/or a network device is operating abnormally. We have developed a test bed to demonstrate and validate our approach to protect against several well-known attacks.</description><identifier>ISBN: 9780769521145</identifier><identifier>ISBN: 0769521142</identifier><identifier>DOI: 10.1109/ICAC.2004.1301398</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer networks ; Fault trees ; IP networks ; Laboratories ; Monitoring ; Protection ; Software agents ; Software systems ; System software ; Testing</subject><ispartof>International Conference on Autonomic Computing, 2004. Proceedings, 2004, p.324-325</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1301398$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1301398$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Guangzhi Qu</creatorcontrib><creatorcontrib>Hariri, S.</creatorcontrib><creatorcontrib>Jangiti, S.</creatorcontrib><creatorcontrib>Rudraraju, J.</creatorcontrib><creatorcontrib>Seungchan Oh</creatorcontrib><creatorcontrib>Fayssal, S.</creatorcontrib><creatorcontrib>Guangsen Zhang</creatorcontrib><creatorcontrib>Parashar, M.</creatorcontrib><title>Online monitoring and analysis for self-protection against network attacks</title><title>International Conference on Autonomic Computing, 2004. Proceedings</title><addtitle>ICAC</addtitle><description>In this paper, we present an online monitoring and analysis framework to achieve self-protection against a wide range of network attacks. Our approach uses the software agents to online monitor several attributes to characterize the state of any network or computing resource as normal, uncertain, or abnormal. The software agents execute the appropriate recovery mechanisms once they determine that a service, and/or a network device is operating abnormally. We have developed a test bed to demonstrate and validate our approach to protect against several well-known attacks.</description><subject>Computer networks</subject><subject>Fault trees</subject><subject>IP networks</subject><subject>Laboratories</subject><subject>Monitoring</subject><subject>Protection</subject><subject>Software agents</subject><subject>Software systems</subject><subject>System software</subject><subject>Testing</subject><isbn>9780769521145</isbn><isbn>0769521142</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj8tqwzAURAWl0JL6A0o3-gGnelrSspi-QiCb7MO1fRXUOFKQBCV_X0MzMMziwDBDyDNna86Ze_3u3_q1YEytuWRcOntHGmcsM53TgnOlH0hTyg9bJJ20wjySzS7OISI9pxhqyiEeKcRpMczXEgr1KdOCs28vOVUca0iRwhFCLJVGrL8pnyjUCuOpPJF7D3PB5pYrsv943_df7Xb3uSzbtsHa2lqrRCeF58ZYo1HbTiGIESZhcRB20E7JiSvwkg3SC8-YBu50JzvmOS5wRV7-awMiHi45nCFfD7fD8g_YkUuL</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Guangzhi Qu</creator><creator>Hariri, S.</creator><creator>Jangiti, S.</creator><creator>Rudraraju, J.</creator><creator>Seungchan Oh</creator><creator>Fayssal, S.</creator><creator>Guangsen Zhang</creator><creator>Parashar, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>Online monitoring and analysis for self-protection against network attacks</title><author>Guangzhi Qu ; Hariri, S. ; Jangiti, S. ; Rudraraju, J. ; Seungchan Oh ; Fayssal, S. ; Guangsen Zhang ; Parashar, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i88t-8842632f177875e5864ea2cad28eb28b5943d14af30b3f2f005a1956360f1e943</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Computer networks</topic><topic>Fault trees</topic><topic>IP networks</topic><topic>Laboratories</topic><topic>Monitoring</topic><topic>Protection</topic><topic>Software agents</topic><topic>Software systems</topic><topic>System software</topic><topic>Testing</topic><toplevel>online_resources</toplevel><creatorcontrib>Guangzhi Qu</creatorcontrib><creatorcontrib>Hariri, S.</creatorcontrib><creatorcontrib>Jangiti, S.</creatorcontrib><creatorcontrib>Rudraraju, J.</creatorcontrib><creatorcontrib>Seungchan Oh</creatorcontrib><creatorcontrib>Fayssal, S.</creatorcontrib><creatorcontrib>Guangsen Zhang</creatorcontrib><creatorcontrib>Parashar, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Guangzhi Qu</au><au>Hariri, S.</au><au>Jangiti, S.</au><au>Rudraraju, J.</au><au>Seungchan Oh</au><au>Fayssal, S.</au><au>Guangsen Zhang</au><au>Parashar, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Online monitoring and analysis for self-protection against network attacks</atitle><btitle>International Conference on Autonomic Computing, 2004. Proceedings</btitle><stitle>ICAC</stitle><date>2004</date><risdate>2004</risdate><spage>324</spage><epage>325</epage><pages>324-325</pages><isbn>9780769521145</isbn><isbn>0769521142</isbn><abstract>In this paper, we present an online monitoring and analysis framework to achieve self-protection against a wide range of network attacks. Our approach uses the software agents to online monitor several attributes to characterize the state of any network or computing resource as normal, uncertain, or abnormal. The software agents execute the appropriate recovery mechanisms once they determine that a service, and/or a network device is operating abnormally. We have developed a test bed to demonstrate and validate our approach to protect against several well-known attacks.</abstract><pub>IEEE</pub><doi>10.1109/ICAC.2004.1301398</doi><tpages>2</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780769521145
ispartof International Conference on Autonomic Computing, 2004. Proceedings, 2004, p.324-325
issn
language eng
recordid cdi_ieee_primary_1301398
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computer networks
Fault trees
IP networks
Laboratories
Monitoring
Protection
Software agents
Software systems
System software
Testing
title Online monitoring and analysis for self-protection against network attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T05%3A18%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Online%20monitoring%20and%20analysis%20for%20self-protection%20against%20network%20attacks&rft.btitle=International%20Conference%20on%20Autonomic%20Computing,%202004.%20Proceedings&rft.au=Guangzhi%20Qu&rft.date=2004&rft.spage=324&rft.epage=325&rft.pages=324-325&rft.isbn=9780769521145&rft.isbn_list=0769521142&rft_id=info:doi/10.1109/ICAC.2004.1301398&rft_dat=%3Cieee_6IE%3E1301398%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1301398&rfr_iscdi=true