Multi - Tiered Architecture for Intrusion Prevention

نویسنده

  • Akhil Behl
چکیده

Today with the Internet available as a general tool, access to any publicly reachable network is a way for the legit users to leverage network resources. On the other hand, it is a way for hackers and attackers to exploit a network whether it is for competitive, financial, revenge or for that matter any malicious purpose. Intrusion prevention is a key component of any security strategy in today’s IT infrastructures. It adds a indispensable layer for defense in depth strategy. Firewalls or authentication systems alone are no longer sufficient to cope with modern day attacks since, firewalls only deny malicious traffic from an unauthorized source however, does not have the capability to stop malicious traffic from authorized end points/sources. Similarly, an authenticated session once compromised, can become a source of Denial of Service (DoS) attack. This paper is dedicated to research on multi-tiered Intrusion Prevention [1] architecture which can not only cope with attacks however, also ensure that the attack vector is blocked and that the attack type is realized if not already known.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review on Information Flow in Intrusion Detection System

An Intrusion Detection System (abbreviated as IDS) is a defense system, which detects hostile activities in a network. The key is then to detect and possibly prevent activities that may compromise system security, or a hacking attempt in progress including reconnaissance/data collection phases that involve for example, port scans. One key feature of intrusion detection systems is their ability ...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

A Security Blueprint for E-Business Applications

This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers—from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, ...

متن کامل

A Temporal Logic Based Approach to Multi-Agent Intrusion Detection and Prevention

Collaborative systems research in the last decade have led to the development in several areas ranging from social computing, e-learning systems to management of complex computer networks. Intrusion Detection Systems (IDS) available today have a number of problems that limit their configurability, scalability or efficiency. An important shortcoming is that the existing architectures is built ar...

متن کامل

On a μ-Kernel Based System Architecture Enabling Recovery from Rootkits

We present a system architecture called spine that supports detection and recovery from many kernel-level and user-level rootkits. The architecture forms a reliable basis for an intrusion recovery system (IRS). The spine architecture is a multi-tiered approach, relying on the integrity of a small μ-kernel based hypervisor for correctness at the base level. Spine vertebrae are positioned at each...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013