Mitigation of network tampering using dynamic dispatch of mobile agents
نویسندگان
چکیده
Detection of malicious activity by insiders, people with legitimate access to resources and services, is particularly difficult in a network environment. In this paper, a novel classification of tampering modes is identified that can be undertaken by insiders against network Intrusion Detection Systems (IDSs). Five categories of tampering modes are defined as spoofing, termination, sidetracking, alteration of internal data, and selective deception. These are further distinguished specifically toward IDS sensor, control, and alarm categories such as spoonfeeding, sugarcoating, and scapegoating. The Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions, or CONFIDANT, uses distributed mobile agents to mitigate these tampering exposures. CONFIDANT employs techniques such as encapsulation, redundancy, scrambling, and mandatory obsolescence. This paper describes how these mitigation techniques are applied within the CONFIDANT framework. The approach focuses on evaluating file integrity through the use of dynamically dispatched mobile agents.
منابع مشابه
Mitigation of Network Tampering Using Dynamic Dispatch of Mobile Agents † Ronald
Detection of malicious activity by insiders, people with legitimate access to resources and services, is particularly difficult in a network environment. In this paper, a novel classification of tampering modes is identified that can be undertaken by insiders against network Intrusion Detection Systems (IDSs). Five categories of tampering modes are defined as spoofing, termination, sidetracking...
متن کاملTrusted Detection of Unauthorized Filesystem Modifications to Combat Insider Tampering †
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tamperingpoint introduces vulnerabilities, especially from knowledgeable insiders capable of ...
متن کاملMitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tampering-point introduces vulnerabilities, especially from knowledgeable insiders capable of...
متن کاملFurther Analysis on the Application of Mobile Agents in Network Routing
Abstract: Mobile agent-based routing is a newly proposed routing technique for using in large networks. In order to save network resources, it is desirable to dispatch a small number of mobile agents to get a high probability of finding the destination (probability of success). Therefore, it is not only necessary but also important to analyze the searching activity and the population growth of ...
متن کاملDistributed Collaborations Using Network Mobile Agents
This paper describes a mobile agent-based approach for supporting coordination of user activities in distributed collaborations. The approach presented here uses XML to specify a collaboration plan in terms of various participants' roles, access rights based on roles, and the coordination actions to be executed when certain events occur. Using this plan an agent-based distributed middleware sys...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 23 شماره
صفحات -
تاریخ انتشار 2004