Mitigation of network tampering using dynamic dispatch of mobile agents

نویسندگان

  • Ronald F. DeMara
  • Adam J. Rocke
چکیده

Detection of malicious activity by insiders, people with legitimate access to resources and services, is particularly difficult in a network environment. In this paper, a novel classification of tampering modes is identified that can be undertaken by insiders against network Intrusion Detection Systems (IDSs). Five categories of tampering modes are defined as spoofing, termination, sidetracking, alteration of internal data, and selective deception. These are further distinguished specifically toward IDS sensor, control, and alarm categories such as spoonfeeding, sugarcoating, and scapegoating. The Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions, or CONFIDANT, uses distributed mobile agents to mitigate these tampering exposures. CONFIDANT employs techniques such as encapsulation, redundancy, scrambling, and mandatory obsolescence. This paper describes how these mitigation techniques are applied within the CONFIDANT framework. The approach focuses on evaluating file integrity through the use of dynamically dispatched mobile agents.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigation of Network Tampering Using Dynamic Dispatch of Mobile Agents † Ronald

Detection of malicious activity by insiders, people with legitimate access to resources and services, is particularly difficult in a network environment. In this paper, a novel classification of tampering modes is identified that can be undertaken by insiders against network Intrusion Detection Systems (IDSs). Five categories of tampering modes are defined as spoofing, termination, sidetracking...

متن کامل

Trusted Detection of Unauthorized Filesystem Modifications to Combat Insider Tampering †

An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tamperingpoint introduces vulnerabilities, especially from knowledgeable insiders capable of ...

متن کامل

Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling

An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tampering-point introduces vulnerabilities, especially from knowledgeable insiders capable of...

متن کامل

Further Analysis on the Application of Mobile Agents in Network Routing

Abstract: Mobile agent-based routing is a newly proposed routing technique for using in large networks. In order to save network resources, it is desirable to dispatch a small number of mobile agents to get a high probability of finding the destination (probability of success). Therefore, it is not only necessary but also important to analyze the searching activity and the population growth of ...

متن کامل

Distributed Collaborations Using Network Mobile Agents

This paper describes a mobile agent-based approach for supporting coordination of user activities in distributed collaborations. The approach presented here uses XML to specify a collaboration plan in terms of various participants' roles, access rights based on roles, and the coordination actions to be executed when certain events occur. Using this plan an agent-based distributed middleware sys...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 23  شماره 

صفحات  -

تاریخ انتشار 2004