A Collaborative Approach for Access Control, Intrusion Detection and Security Testing

Author(s):  
M. Blanc ◽  
J. Briffaut ◽  
P. Clemente ◽  
M.G. El Rab ◽  
C. Toinard
2003 ◽  
Vol 14 (9) ◽  
pp. 841-850 ◽  
Author(s):  
T. Ryutov ◽  
C. Neuman ◽  
Dongho Kim ◽  
Li Zhou

Author(s):  
Rainer Bye ◽  
Ahmet Camtepe ◽  
Sahin Albayrak

Collaborative methods are promising tools for solving complex security tasks. In this context, the authors present the security overlay framework CIMD (Collaborative Intrusion and Malware Detection), enabling participants to state objectives and interests for joint intrusion detection and find groups for the exchange of security-related data such as monitoring or detection results accordingly; to these groups the authors refer as detection groups. First, the authors present and discuss a tree-oriented taxonomy for the representation of nodes within the collaboration model. Second, they introduce and evaluate an algorithm for the formation of detection groups. After conducting a vulnerability analysis of the system, the authors demonstrate the validity of CIMD by examining two different scenarios inspired sociology where the collaboration is advantageous compared to the non-collaborative approach. They evaluate the benefit of CIMD by simulation in a novel packet-level simulation environment called NeSSi (Network Security Simulator) and give a probabilistic analysis for the scenarios.


2012 ◽  
Vol 433-440 ◽  
pp. 4279-4283
Author(s):  
Xiao Bo Huang ◽  
Xiao Lin Huang ◽  
Quan Pu

To satisfy the special needs of confidential networks, a protection method of combining ingress and egress access control for network boundary security is proposed. In preventing network attacks, a combined mechanism of packets filtering firewall and intrusion detection system based on artificial neural network and rule matching is implemented to increase the accuracy of intrusion detection. In preventing information leakage, techniques of identity authentication and content filtering are integrated into the mechanism of egress access control so that strategies with more flexibility in security auditing and access control can be implemented, which is effective to prevent the sensitive or secret data from leaking out and to trace the source of leakage.


Author(s):  
Abdul Razaque ◽  
Shaldanbayeva Nazerke ◽  
Bandar Alotaibi ◽  
Munif Alotaibi ◽  
Akhmetov Murat ◽  
...  

Nowadays, cloud computing is one of the important and rapidly growing paradigms that extend its capabilities and applications in various areas of life. The cloud computing system challenges many security issues, such as scalability, integrity, confidentiality, and unauthorized access, etc. An illegitimate intruder may gain access to the sensitive cloud computing system and use the data for inappropriate purposes that may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for Big data in cloud computing. The HUDU aims to restrict illegitimate users from accessing the cloud and data security provision. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. HUDH involves three algorithms; Advanced Encryption Standards (AES) for encryption, Attribute-Based Access Control (ABAC) for data access control, and Hybrid Intrusion Detection (HID) for unauthorized access detection. The proposed scheme is implemented using Python and Java language. Testing results demonstrate that the HUDH can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% high accuracy.


In the field of information mining, exceptions are likewise alluded to as outliers, variations from the norm, discordant perceptions, or freaks. Other application spaces may utilize terms like exceptions, amazements, or contaminants. Every one of these wordings is catching a deviation from an expected ordinary information demonstration. In this research work, another system that comprises of an Intelligent Agent Based Access Control subsystem and Intrusion Detection subsystem for securing the Web Database has been proposed and actualized. With a specific end goal to give a viable access control framework, new access control variable based math and new arrangements utilizing rules have been proposed and executed. Keeping in mind the end goal to perform interruption and outlier identification successfully, a half and half Intelligent Agent based Intrusion Detection framework has been proposed in this work which enhances the security of the network database.


2006 ◽  
Vol 15 (05) ◽  
pp. 849-854 ◽  
Author(s):  
JUAN JOSÉ GARCÍA ADEVA ◽  
JUAN MANUEL PIKATZA ATXA

Security in web-based systems that handle confidential information can be considered a particularly sensitive subject that requires assuming some responsibilities about security. Achieving a secure web application involves tackling several issues such encryption of traffic and certain database information, strictly restricted access control, etc. In this work we focus on detecting misuse of the web application in order to gain unauthorised access. We introduce an Intrusion Detection component that by applying Text Categorisation is capable of learning the characteristics of both normal and malicious user behaviour from the regular, high-level log entries generated by web application through its application server. Therefore, the detection of misuse in the web application is achieved without the need of explicit programming or modification of the existing web application. We applied our Intrusion Detection component to a real web-based telemedicine system in order to offer some evaluation measurements. This articles offers an overview of the model, our experiences, and observations.


Sign in / Sign up

Export Citation Format

Share Document