OpenPMF: Using Open Source for Security Policy Integration and Intrusion Detection in Heterogeneous Distributed IT Systems
نویسندگان
چکیده
Most organisations today need to maintain and periodically migrate a heterogeneous distributed IT infrastructure to more modern platforms. This is typically a time-consuming, expensive, and error-prone process. The same problem also applies to IT security – security technologies and policy management consoles are changed periodically. We use software modelling concepts to ease the maintenance and migration efforts of distributed systems infrastructure and in particular distributed systems security (e.g. for CORBA, CORBA Components, EJB, Web Services, .NET). The use of Open Source software can simplify this task further because infrastructure technologies can be flexibly adapted and integrated with existing technologies. In this paper, we will discuss the challenges and benefits of using software modelling and open source software help make distributed applications and their complex security policies weather modifications in the underlying infrastructure technologies. We also present OpenPMF, our innovative Open Source security framework and implementation which enables centralised, technology-independent security policy management and intrusion detection for distributed heterogeneous systems. The paper argues that the concepts of modeldriven software development can be successfully applied to security, and that this approach yields a number of benefits. Moreover, we claim that Open Source software can support this process because customization and integration problems are mitigated when the source code is available.
منابع مشابه
A Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملMoving dispersion method for statistical anomaly detection in intrusion detection systems
A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملA hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005