Today hackers disguise their attacks by launching them form a set of compromised hosts distributed across the Internet. It is very difficult to defend against these attacks or to track down their origin. Commercially available intrusion detection systems can signal the occurrence of limited known types of attacks. New types of attacks are launched regularly but these tools are not effective in detecting them. Human experts are still the key tool for identifying, tracking, and disabling new attacks. Often this involves experts from many organizations working together to share their observations, hypothesis, and attack signatures. Unfortunately, today these experts have few tools that help them to automate this process. In this project we recognize that human experts will remain a critical part in the process of identifying, tracking and disabling computer attacks. We also recognize that an important part of the discovery, analysis, and defense against new distributed attacks is the cooperation that occurs between experts across different organizations. Many installations do not have the expertise necessary to develop full attack analyses. Our goal is to build automated tools for computer experts and system administrators to: • identify the characteristics of an attack given data from network sensors • develop a hypothesis about the nature and origin of the attack • share that hypothesis with security managers from other sites • test that hypothesis at those other sites and coordinate the results of testing • archive the data necessary for use as evidence in later law-enforcement actions ∗We are grateful to the DOJ for their generous support of this work.

Using mobile agents for analyzing intrusion in computer networks / J. Aslam, M. Cremonini, D. Kotz, D. Rus. ((Intervento presentato al convegno ECOOP tenutosi a Budapest nel 2001.

Using mobile agents for analyzing intrusion in computer networks

M. Cremonini
Secondo
;
2001

Abstract

Today hackers disguise their attacks by launching them form a set of compromised hosts distributed across the Internet. It is very difficult to defend against these attacks or to track down their origin. Commercially available intrusion detection systems can signal the occurrence of limited known types of attacks. New types of attacks are launched regularly but these tools are not effective in detecting them. Human experts are still the key tool for identifying, tracking, and disabling new attacks. Often this involves experts from many organizations working together to share their observations, hypothesis, and attack signatures. Unfortunately, today these experts have few tools that help them to automate this process. In this project we recognize that human experts will remain a critical part in the process of identifying, tracking and disabling computer attacks. We also recognize that an important part of the discovery, analysis, and defense against new distributed attacks is the cooperation that occurs between experts across different organizations. Many installations do not have the expertise necessary to develop full attack analyses. Our goal is to build automated tools for computer experts and system administrators to: • identify the characteristics of an attack given data from network sensors • develop a hypothesis about the nature and origin of the attack • share that hypothesis with security managers from other sites • test that hypothesis at those other sites and coordinate the results of testing • archive the data necessary for use as evidence in later law-enforcement actions ∗We are grateful to the DOJ for their generous support of this work.
2001
security; mobile agents
Settore INF/01 - Informatica
Settore ING-INF/05 - Sistemi di Elaborazione delle Informazioni
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.2288
Using mobile agents for analyzing intrusion in computer networks / J. Aslam, M. Cremonini, D. Kotz, D. Rus. ((Intervento presentato al convegno ECOOP tenutosi a Budapest nel 2001.
Conference Object
File in questo prodotto:
File Dimensione Formato  
10.1.1.147.2288.pdf

accesso aperto

Descrizione: Articolo principale
Tipologia: Post-print, accepted manuscript ecc. (versione accettata dall'editore)
Dimensione 57.94 kB
Formato Adobe PDF
57.94 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/452298
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact