CERIAS Tech Report 2003-32 ADEPTS: ADAPTIVE INTRUSION CONTAINMENT AND RESPONSE USING ATTACK GRAPHS IN AN E-COMMERCE ENVIRONMENT

نویسندگان

  • Yu-Sung Wu
  • Bingrui Foo
  • Blake Matheny
  • Tyler Olsen
  • Saurabh Bagchi
چکیده

Distributed e-commerce systems are suitable targets for malicious attacks because of the potential financial impact. Intrusion detection in such systems has been an active area of research. Once an intrusion is detected, it is important to contain the effect of the intrusion to some parts of the system while allowing the other parts to continue to provide service. It is also important to take preventive or reactive response to reduce the likelihood of the system being compromised through a future attack. In this paper, we present the design and implementation of an Adaptive Intrusion Tolerant System, ADEPTS, for automatically containing and responding to intrusions in a distributed e-commerce system. We use a directed acyclic graph (DAG) of intrusion goals as the underlying representation in the system. In an I-DAG, the nodes are sub-goals of an attack and to reach a particular node, goals corresponding to its child nodes have to be achieved first. We assume an intrusion detection framework which provides alerts to ADEPTS. In response, a parallel algorithm is executed to compute the likelihood that one or more goals in the DAG have been achieved. Next, a response measure computation algorithm is executed to determine the appropriate response action. There is also a feedback mechanism which estimates the success or failure of a deployed response and uses that in adjusting the system weights to guide future choices. ADEPTS is implemented on a distributed e-commerce system that comprises services including, web server, application server, database server, directory server. Alerts are simulated corresponding to different attack types, the algorithms executed and response actions deployed. The experiments bring out the latency of the infrastructure, and the effectiveness in dealing with failed responses through escalation compared to statically mapped Intrusion Response Systems (IRS).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ADEPTS: Adaptive Intrusion Containment and Response using Attack Graphs in an E-Commerce Environment

Distributed e-commerce systems are suitable targets for malicious attacks because of the potential financial impact. Intrusion detection in such systems has been an active area of research. Once an intrusion is detected, it is important to contain the effect of the intrusion to some parts of the system while allowing the other parts to continue to provide service. It is also important to take p...

متن کامل

Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security

The sheer number and sophistication of cyber attacks are making our nation’s critical computer networks increasingly vulnerable. At the same time, these networks are being called upon to play a key role in processing, data storage, monitoring and control of critical infrastructures such as energy, transportation, and finance. Disruption of these networks can have highly damaging affects on our ...

متن کامل

The Inside-Out Approach to Infection Control

CHALLENGES TO THE SECURITY OF ENTERPRISE NETWORKS The common image of the enterprise network conjures up a fortress with a perimeter protected by a layer of security devices (firewalls, proxy routers, intrusion prevention systems, etc.). In this view, the territory is clearly demarcated and the feared attacks come from outside. Enter wireless technology and the ubiquitous laptop; rather than a ...

متن کامل

Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries

The emerging malware that can spread through local wireless networks among mobile devices has so far received less attention than computer worms in the Internet. The local wireless links provide an alternative propagation path that circumvents intrusion detection at the service provider gateways. On the mobile nodes, conventional intrusion detection and intrusion response techniques such as add...

متن کامل

COVID-19 Intervention Scenarios for a Long-term Disease Management

Background The first outbreak of coronavirus disease 2019 (COVID-19) was successfully restrained in many countries around the world by means of a severe lockdown. Now, we are entering the second phase of the pandemics in which the spread of the virus needs to be contained within the limits that national health systems can cope with. This second phase of the epidemics is expected to last until a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003