2006
DOI: 10.1007/11663812_3
|View full text |Cite
|
Sign up to set email alerts
|

COTS Diversity Based Intrusion Detection and Application to Web Servers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 43 publications
(32 citation statements)
references
References 12 publications
0
32
0
Order By: Relevance
“…In the context of intrusion detection networks, a number of works (such as the ones presented in [32,33]) use the concept of diversity in detection capabilities to increase robustness when detecting security threats (e.g., by using different detection techniques and configurations to monitor the same set of requirements). Nevertheless, as far as we know none of them applies diversity to trust with the aim of increasing the quality and resilience of collaborative attack detection.…”
Section: Related Workmentioning
confidence: 99%
“…In the context of intrusion detection networks, a number of works (such as the ones presented in [32,33]) use the concept of diversity in detection capabilities to increase robustness when detecting security threats (e.g., by using different detection techniques and configurations to monitor the same set of requirements). Nevertheless, as far as we know none of them applies diversity to trust with the aim of increasing the quality and resilience of collaborative attack detection.…”
Section: Related Workmentioning
confidence: 99%
“…This architecture is then utilized for developing diversity-based intrusion detection techniques [6,10,11,16,25]. Most of these techniques use Commercial Off-The-Shelf (COTS) software to build the detection models.…”
Section: Related Workmentioning
confidence: 99%
“…Most of these techniques use Commercial Off-The-Shelf (COTS) software to build the detection models. Among those schemes, the techniques proposed by Just et al [16] and Totel et al [25] are output voting schemes, which only compare the final outputs (HTTP status codes and files) of the diverse software to detect intrusions. However, as many of the intrusions may not result in observable deviation in the responses of those server software, such intrusions can evade detections of these techniques.…”
Section: Related Workmentioning
confidence: 99%
“…DADDi [8] (Dependable Anomaly Detection with Diagnosis) implements an IDS for web servers with an architecture composed by three different COTS servers: an Apache on Mac-OS X, an IIS on Windows 2000 and a thttpd on Linux. The project extends the comparison to the complete network output of the COTS servers.…”
Section: Black-box Intrusion Detection Using Diversitymentioning
confidence: 99%
“…Most of the time, anomaly detection requires to explicitly build the model of the normal behavior, either statically or dynamically (e.g., during a learning phase). Previous work [9,6,8] has introduced a way to avoid building the behavior model explicitly, while allowing the built IDS to detect new or unknown attacks. This previous work is based on a dependability technique: N-version programming [1].…”
Section: Introductionmentioning
confidence: 99%