2004
DOI: 10.1007/978-3-540-30191-2_18
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation

Abstract: We present in this paper a decentralized architecture to correlate alerts between cooperative nodes in a secure multicast infrastructure. The purpose of this architecture is to detect and prevent the use of network resources to perform coordinated attacks against third party networks. By means of a cooperative scheme based on message passing, the different nodes of this system will collaborate to detect its participation on a coordinated attack and will react to avoid it. An overview of the implementation of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…Thus, they allow detecting complex attacks that take place in several steps. Such approaches (e.g., Dain and Cunningham [2001], Garcia et al [2004], and Eckmann et al [2002]) usually require one to establish an attack database. Furthermore, most of these approaches need to be initialized by a training dataset.…”
Section: Correlation and Aggregationmentioning
confidence: 99%
“…Thus, they allow detecting complex attacks that take place in several steps. Such approaches (e.g., Dain and Cunningham [2001], Garcia et al [2004], and Eckmann et al [2002]) usually require one to establish an attack database. Furthermore, most of these approaches need to be initialized by a training dataset.…”
Section: Correlation and Aggregationmentioning
confidence: 99%
“…The information exchange between peers is intended to manage a more complete view of the whole system. Once achieved, one can detect and react on the different actions of the corresponding attack [3].…”
Section: System Overviewmentioning
confidence: 99%
“…As described out in [3], the entities of our prevention platform cooperate to detect if the resources, where they are lodged, are taking an active part of a coordinate attack. As it happens with any other traditional detection system, if an attacker is able to manipulate the processes associated to each node, she could bypass the detection mechanisms.…”
Section: Protection Mechanismsmentioning
confidence: 99%
See 1 more Smart Citation
“…Designing such a system is motivated by future application needs, as we envision that BFT pub/sub can play a role in preventing cheaters in multiplayer online games [2] or fraud in online trading/auctions, or to increase resilience to attacks for an intrusion detection system [12].…”
Section: Introductionmentioning
confidence: 99%