Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The “Defence in depth” strategy for securing computer systems claims that technologies used to protect a network should fulfill the “Protect, Detect and React” paradigm. “This means that in addition to incorporating protection mechanisms, organizations need to expect attacks and include attack detection tools” [1]. This paper presents MetaIDS – the Intrusion Detection System developed in Poznań Supercomputing and Networking Center. It detects both attack attempts and successful attacks to the system. The paper highlights typical problems with intrusions detection, principle of the MetaIDS work and real attack example seen from the perspective of MetaIDS.
Słowa kluczowe
Rocznik
Strony
135--145
Opis fizyczny
Bibliogr. 8 poz., rys.
Twórcy
autor
autor
- Poznań Supercomputing and Networking Center, ul. Noskowskiego 12/14, 61-704 Poznań, Poland, marcin.jerzak@man.poznan.pl
Bibliografia
- [1] Agency, National Security. Defense in Depth. A practical strategy for achieving Information Assurance in today’s highly networked environments. [Online] http://www.nsa.gov/ia/_files/support/defenseindepth.pdf.
- [2] Distributed Intrusion Detection System. [Online] http://ppbw.pcss.pl/en/dids.html.
- [3] Polish Platform for Homeland Security. [Online] http://ppbw.pcss.pl/en/.
- [4] An open source network intrusion prevention and detection system (IDS/IPS). [Online] http://www.snort.org/.
- [5] An Open Source Host-based Intrusion Detection System. [Online] http://www.ossec.net/.
- [6] The Intrusion Detection Message Exchange Format. [Online] http://www.ietf.org/rfc/rfc4765.txt.
- [7] Agentless, universal, security information management. [Online] http://www.prelude-technologies.com/.
- [8] PSNC Securiy Team. [Online] http://security.psnc.pl/en.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUJ5-0028-0029