loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jens Lichtenberg 1 and Jorge Marx Gómez 2

Affiliations: 1 Ohio University, United States ; 2 Otto-von-Guericke-Universität, Germany

Abstract: One of the main problems in eCommerce applications and all other systems handling confidential information in general, is the matter of security. This paper introduces the idea of an intrusion detection management system to support the security. Intrusion detection per se, is the act of detecting an unauthorized intrusion by a computer or a network from the inside or the outside of the affected system, making an intrusion the attempt to compromise or otherwise do harm to other network devices. Next to the normal intrusion detection system an Intrusion Management System applies different Intrusion Detection Systems to not only detect a threat but also analyze it and propose counter measures to avoid the compromise of the guarded system. For the treatment plan, depending on the analysis, a multitude of counter measures is identified and ranked. The counter measure identification is done using data mining techniques on a counter measure repository, the final ranking through sorting algo rithms. Of the numerous data mining techniques applicable for diagnostic or analytic purposes the nearest neighbor and the correlation coefficient techniques have been implemented. A feasibility study has shown that an analyzer can match a problem against a solution repository and find the optimal treatment suggestions, applied with a ranking, in an acceptable short period of time. Future work will include the analysis of attack characteristics and goals, and the interaction between system manager, response planning and execution module and the attack analyzer. Furthermore the counter measure repository will be evaluated and updated. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 44.202.128.177

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Lichtenberg, J. and Marx Gómez, J. (2005). Intrusion Detection Management System for eCommerce security. In Proceedings of the 5th International Workshop on Pattern Recognition in Information Systems (ICEIS 2005) - PRIS; ISBN 972-8865-28-7, SciTePress, pages 134-143. DOI: 10.5220/0002520101340143

@conference{pris05,
author={Jens Lichtenberg. and Jorge {Marx Gómez}.},
title={Intrusion Detection Management System for eCommerce security},
booktitle={Proceedings of the 5th International Workshop on Pattern Recognition in Information Systems (ICEIS 2005) - PRIS},
year={2005},
pages={134-143},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002520101340143},
isbn={972-8865-28-7},
}

TY - CONF

JO - Proceedings of the 5th International Workshop on Pattern Recognition in Information Systems (ICEIS 2005) - PRIS
TI - Intrusion Detection Management System for eCommerce security
SN - 972-8865-28-7
AU - Lichtenberg, J.
AU - Marx Gómez, J.
PY - 2005
SP - 134
EP - 143
DO - 10.5220/0002520101340143
PB - SciTePress