Collaborative intrusion prevention

dc.contributor.advisorMok, Aloysius Ka-Lauen
dc.creatorChung, Pak Hoen
dc.date.accessioned2010-06-02T18:29:48Zen
dc.date.accessioned2017-05-11T22:19:51Z
dc.date.available2010-06-02T18:29:48Zen
dc.date.available2017-05-11T22:19:51Z
dc.date.issued2009-12en
dc.descriptiontexten
dc.description.abstractIntrusion Prevention Systems (IPSs) have long been proposed as a defense against attacks that propagate too fast for any manual response to be useful. While purely-network-based IPSs have the advantage of being easy to install and manage, research have shown that this class of systems are vulnerable to evasion [70, 65], and can be tricked into filtering normal traffic and create more harm than good [12, 13]. Based on these researches, we believe information about how the attacked hosts process the malicious input is essential to an effective and reliable IPS. In existing IPSs, honeypots are usually used to collect such information. The collected information will then be analyzed to generate countermeasures against the observed attack. Unfortunately, techniques that allow the honeypots in a network to be identified ([5, 71]) can render these IPSs useless. In particular, attacks can be designed to avoid targeting the identified honeypots. As a result, the IPSs will have no information about the attacks, and thus no countermeasure will ever be generated. The use of honeypots is also creating other practical issues which limit the usefulness/feasibility of many host-based IPSs. We propose to solve these problems by duplicating the detection and analysis capability on every protected system; i.e., turning every host into a honeypot.en
dc.description.departmentComputer Sciencesen
dc.format.mediumelectronicen
dc.identifier.urihttp://hdl.handle.net/2152/7581en
dc.language.isoengen
dc.rightsCopyright is held by the author. Presentation of this material on the Libraries' web site by University Libraries, The University of Texas at Austin was made possible under a limited license grant from the author who has retained all copyrights in the works.en
dc.subjectIntrusion Prevention Systemsen
dc.subjectIPSen
dc.subjectHoneypotsen
dc.subjectNetwork-baseden
dc.subjectHost-baseden
dc.subjectAttacksen
dc.subjectNetworksen
dc.subjectProtected systemsen
dc.titleCollaborative intrusion preventionen

Files