INTRUSION DETECTION AND RESPONSE TO AUTOMATED ATTACKS - An Overview of Automated Threats To Computer Infrastructure

Shawn Maschino

2005

Abstract

This survey paper investigates current research in the fields of intrusion detection and response for automated attacks such as worms, denial-of-service, and distributed denial-of-service attacks. As the number of networked systems rise the ability to detect and respond to attacks is an essential part of system security for protecting data and ensuring availability of systems. This paper highlights current risk due to the latest automated attack technology and applies historical and current research to show the information security approach to detecting and preventing these types of attacks.Recent technologies such as virtualization and grid computing are discussed in relation to the roles they play in this area, and future areas of work are addressed.

References

  1. Denning, D. (1986). An Intrusion-Detection Model. 1986 IEEE Symposium on Security and Privacy.
  2. DShield. (October 2004). DShield Records Added Report. Retrieved October 17, 2004, from the DShield Web site: http://www.dshield.org.
  3. Gorodetski, V., Kotenko, I. & Karsaev, O. (July 2003). Multi-agent technologies for computer network security. International Journal of Computer Systems Science & Engineering, Volume 18, Number 4. 191- 200.
  4. Internet Storm Center. (October 2004). Average Time Between Attacks: Survival Time. Retrieved October 17, 2004, from the Internet Storm Center Web site: http://isc.sans.org.
  5. Kreibich, C. & Crowcroft, J. (January 2004). Honeycomb - Creating Intrusion Detection Signatures Using Honeypots. ACM SIGCOMM Computer Communications Review, Volume 34, Number 1. 51- 56.
  6. Lemos, R. (January 31, 2003). Counting The Cost of Slammer. CNet News. Retrieved October 16, 2004, from the CNet News Web site: http://surveys.cnet.com/2100-1001-982955.html.
  7. Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., & Weaver, N. (2003). Inside the Slammer Worm. IEEE Security & Privacy. 33-39.
  8. Tupakula, U. & Varadharajan, V. (2003). A Practical Method to Counteract Denial of Service Attacks. Retrieved October 23, 2003 from the Conferences in Research Web site: http://crpit.com/confpapers/CRPITV16Tupakula.pdf.
  9. Zou, C., Gao, L, Gong, W., & Towsley, D. (2003). Monitoring and Early Warning for Internet Worms. Proceedings of the CCC'03 Conference, 190-199.
Download


Paper Citation


in Harvard Style

Maschino S. (2005). INTRUSION DETECTION AND RESPONSE TO AUTOMATED ATTACKS - An Overview of Automated Threats To Computer Infrastructure . In Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 972-8865-19-8, pages 522-525. DOI: 10.5220/0002540805220525


in Bibtex Style

@conference{iceis05,
author={Shawn Maschino},
title={INTRUSION DETECTION AND RESPONSE TO AUTOMATED ATTACKS - An Overview of Automated Threats To Computer Infrastructure},
booktitle={Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2005},
pages={522-525},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002540805220525},
isbn={972-8865-19-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - INTRUSION DETECTION AND RESPONSE TO AUTOMATED ATTACKS - An Overview of Automated Threats To Computer Infrastructure
SN - 972-8865-19-8
AU - Maschino S.
PY - 2005
SP - 522
EP - 525
DO - 10.5220/0002540805220525