CERIAS Tech Report 2003-32 ADEPTS: ADAPTIVE INTRUSION CONTAINMENT AND RESPONSE USING ATTACK GRAPHS IN AN E-COMMERCE ENVIRONMENT
نویسندگان
چکیده
Distributed e-commerce systems are suitable targets for malicious attacks because of the potential financial impact. Intrusion detection in such systems has been an active area of research. Once an intrusion is detected, it is important to contain the effect of the intrusion to some parts of the system while allowing the other parts to continue to provide service. It is also important to take preventive or reactive response to reduce the likelihood of the system being compromised through a future attack. In this paper, we present the design and implementation of an Adaptive Intrusion Tolerant System, ADEPTS, for automatically containing and responding to intrusions in a distributed e-commerce system. We use a directed acyclic graph (DAG) of intrusion goals as the underlying representation in the system. In an I-DAG, the nodes are sub-goals of an attack and to reach a particular node, goals corresponding to its child nodes have to be achieved first. We assume an intrusion detection framework which provides alerts to ADEPTS. In response, a parallel algorithm is executed to compute the likelihood that one or more goals in the DAG have been achieved. Next, a response measure computation algorithm is executed to determine the appropriate response action. There is also a feedback mechanism which estimates the success or failure of a deployed response and uses that in adjusting the system weights to guide future choices. ADEPTS is implemented on a distributed e-commerce system that comprises services including, web server, application server, database server, directory server. Alerts are simulated corresponding to different attack types, the algorithms executed and response actions deployed. The experiments bring out the latency of the infrastructure, and the effectiveness in dealing with failed responses through escalation compared to statically mapped Intrusion Response Systems (IRS).
منابع مشابه
ADEPTS: Adaptive Intrusion Containment and Response using Attack Graphs in an E-Commerce Environment
Distributed e-commerce systems are suitable targets for malicious attacks because of the potential financial impact. Intrusion detection in such systems has been an active area of research. Once an intrusion is detected, it is important to contain the effect of the intrusion to some parts of the system while allowing the other parts to continue to provide service. It is also important to take p...
متن کاملDistributed Intrusion Detection and Attack Containment for Organizational Cyber Security
The sheer number and sophistication of cyber attacks are making our nation’s critical computer networks increasingly vulnerable. At the same time, these networks are being called upon to play a key role in processing, data storage, monitoring and control of critical infrastructures such as energy, transportation, and finance. Disruption of these networks can have highly damaging affects on our ...
متن کاملThe Inside-Out Approach to Infection Control
CHALLENGES TO THE SECURITY OF ENTERPRISE NETWORKS The common image of the enterprise network conjures up a fortress with a perimeter protected by a layer of security devices (firewalls, proxy routers, intrusion prevention systems, etc.). In this view, the territory is clearly demarcated and the feared attacks come from outside. Enter wireless technology and the ubiquitous laptop; rather than a ...
متن کاملComputer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries
The emerging malware that can spread through local wireless networks among mobile devices has so far received less attention than computer worms in the Internet. The local wireless links provide an alternative propagation path that circumvents intrusion detection at the service provider gateways. On the mobile nodes, conventional intrusion detection and intrusion response techniques such as add...
متن کاملCOVID-19 Intervention Scenarios for a Long-term Disease Management
Background The first outbreak of coronavirus disease 2019 (COVID-19) was successfully restrained in many countries around the world by means of a severe lockdown. Now, we are entering the second phase of the pandemics in which the spread of the virus needs to be contained within the limits that national health systems can cope with. This second phase of the epidemics is expected to last until a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003