2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W) 2013
DOI: 10.1109/dsnw.2013.6615538
|View full text |Cite
|
Sign up to set email alerts
|

An intrusion-tolerant firewall design for protecting SIEM systems

Abstract: Abstract-Nowadays, organizations are resorting to Security Information and Event Management (SIEM) systems to monitor and manage their network infrastructures. SIEMs employ a data collection capability based on many sensors placed in critical points of the network, which forwards events to a core facility for processing and support different forms of analysis (e.g., report attacks in near real time, inventory management, risk assessment). In this paper, we will focus on the defense of the core facility compone… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Such complex processing engines already exist as a research prototypes, i.e. Massif project [21,22,8], but also reached maturity level where they have been adopted by industry and deployed in production, including BeepBeep-3 [5], Apache Flink and Storm [3], SQLstream [36].…”
Section: Prilok Complex Event Processing Engine (Pcepe)mentioning
confidence: 99%
“…Such complex processing engines already exist as a research prototypes, i.e. Massif project [21,22,8], but also reached maturity level where they have been adopted by industry and deployed in production, including BeepBeep-3 [5], Apache Flink and Storm [3], SQLstream [36].…”
Section: Prilok Complex Event Processing Engine (Pcepe)mentioning
confidence: 99%
“…Making security services intrusion tolerant has also been the subject of previous publications, mostly focussing on rewalls. Garcia et al propose such intrusion tolerant rewall for protecting SIEM systems [6]. Sousa et al [12] propose a self-healing intrusion tolerant rewall architecture for protecting critical infrastructures.…”
Section: Related Workmentioning
confidence: 99%
“…Fault-tolerant protocols have been extensively used by distributed systems to provide robustness and high availability [42,55,61,82,94,131,180]. While cloud systems, such as Google's Spanner [82], Amazon's Dynamo [94], and Facebook's Tao [61], rely on crash fault-tolerant protocols, e.g., Paxos [149], to establish consensus, a Byzantine fault-tolerant (BFT) protocol is a key ingredient in distributed systems with non-trustworthy infrastructures, e.g., permissioned blockchains [1- 3, 24, 26, 28-30, 32, 44, 78, 115-117, 124, 147, 196, 203, 206] and even permissionless blockchains [62,139,141,167,230], distributed file systems [13,70,80], locking service [81], firewalls [53,111,112,202,213,228], certificate authority systems [234], SCADA systems [40,138,188,233], key-value datastores [51,98,114,127,202], and key management [170].…”
Section: Introductionmentioning
confidence: 99%