2003
DOI: 10.1109/tpds.2003.1233707
|View full text |Cite
|
Sign up to set email alerts
|

Integrated access control and intrusion detection for web servers

Abstract: Abstract-Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and interoperation between these components prevents detecting and responding to ongoing attacks in real-time before they cause damage. To address this, we apply dynamic authorization techniques to support fine-grained access control and application level intrusion detection and response capabilities. This paper describes our experience with integration of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(21 citation statements)
references
References 4 publications
0
20
0
Order By: Relevance
“…The approach to integrated security used by Ryutov et al [7,8] is based the notion of an advanced security policy that can specify allowed activities, detect abuse and respond to intrusions. Each of these tasks (access control, intrusion detection and intrusion response) is performed by a single, multi-phase policy evaluator.…”
Section: Threat Assessmentmentioning
confidence: 99%
“…The approach to integrated security used by Ryutov et al [7,8] is based the notion of an advanced security policy that can specify allowed activities, detect abuse and respond to intrusions. Each of these tasks (access control, intrusion detection and intrusion response) is performed by a single, multi-phase policy evaluator.…”
Section: Threat Assessmentmentioning
confidence: 99%
“…Most existing IDSes reside on a single host, only examining application-level [1] and system-level [2] logs, as such detailed information can identify attacks on individual machines. However, today's fast propagating viruses/ worms (e.g., SQL Slammer worm) can infect most of the vulnerable machines in the Internet within 10 min [5] or even less than 30 s with some highly virulent techniques [6,7].…”
Section: First Scalability To High-speed Networkmentioning
confidence: 99%
“…However, spoofed DoS attacks will still cause collisions in TRW-AC, and leave the real port scans undetected. 1 The existing schemes can detect specific types of attacks, but will perform poorly when facing a mixture of attacks as in the real world. People may attempt to combine TRW-AC and CPM to detect both scans and SYN flooding attacks.…”
Section: Related Work On Intrusion Detection Systemsmentioning
confidence: 99%
See 2 more Smart Citations