DOI: 10.1007/978-0-387-09699-5_20
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs

Abstract: Design diversity is a well-known method to ensure fault tolerance. Such a method has also been applied successfully in various projects to provide intrusion detection and tolerance. Two types of approaches have been investigated: the comparison of the outputs of the diversified services without any knowledge of the internals of the server (black box approach) or an intrusive observation of the activities that occur on the diversified servers (gray box approach). Previous work on black-box approaches have shown… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…We are able to find a number of applications of anomaly detection in engineering problems, mainly fault tolerance [19][20][21][22][23]. An application in medical studies is work on blood oxygen saturation and heart rate in obstructive sleep apnea [24][25][26].…”
Section: Discussionmentioning
confidence: 99%
“…We are able to find a number of applications of anomaly detection in engineering problems, mainly fault tolerance [19][20][21][22][23]. An application in medical studies is work on blood oxygen saturation and heart rate in obstructive sleep apnea [24][25][26].…”
Section: Discussionmentioning
confidence: 99%
“…In the literature we find a number of approaches for modeling security with information flow graphs, e.g. [3], [11], [8]. However, only Chivers [3] uses information flow trees and form attack paths for analyzing risk.…”
Section: Related Work and Conclusionmentioning
confidence: 99%
“…It is the sole part of the architecture accessible directly by the clients. The IDS is in [15,26,28], system calls' sequences [14] or the information flow graphs [18]. Furthermore, in our work, it must compare the result status of the interpreter of the script language in which the web application is written.…”
Section: Architecturementioning
confidence: 99%
“…This idea has then been extended [26][27][28] to the actual web page responses from the servers. Other ideas have been proposed which consists, instead of focusing on the outputs of COTS, in monitoring their behavior by comparing the sequences of system calls [14] or the information flow graphs [18].…”
Section: Related Workmentioning
confidence: 99%