Intrusion detection using third-parties support

Masakazu Fujii, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai

Research output: Contribution to conferencePaperpeer-review

Abstract

Intrusions are one of the most important issues in the current Internet environment. Therefore, a lot of researchers and companies elaborated countermeasure techniques such as Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). These systems detect intrusions and prevent attackers from succeeding in their intrusion attempts. They usually rely on pattern matching and therefore, work efficiently on known-attacks. However, they do not work efficiently on unknown-attacks such as zero-day attacks and targeted attacks. This means, we should assume that our machines can be corrupted anytime. Therefore, we should consider what we can do under this assumption for a next generation security framework. In this paper, we propose a new intrusion detection methodology using the support of other machines. In our proposal, when an attacker tries to attack other machines from a corrupted machine that the attacker has already intruded, other machines notify it to the administrator of the corrupted machine. Then, the attacker may lose the corrupted machine. Therefore, the attacker restrains itself from imprudently attacking other machines. This will suppress the propagation of corrupted machines in the Internet.

Original languageEnglish
Pages206-212
Number of pages7
DOIs
Publication statusPublished - 2008
Event12th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS 2008 - Kunming, China
Duration: Oct 21 2008Oct 23 2008

Other

Other12th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS 2008
Country/TerritoryChina
CityKunming
Period10/21/0810/23/08

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Intrusion detection using third-parties support'. Together they form a unique fingerprint.

Cite this