[go: up one dir, main page]

Foo et al., 2008 - Google Patents

Intrusion response systems: a survey

Foo et al., 2008

View PS
Document ID
8608358050942731739
Author
Foo B
Glause M
Howard G
Wu Y
Bagchi S
Spafford E
Publication year
Publication venue
Information assurance: dependability and security in networked systems

External Links

Snippet

The occurrence of outages due to failures in today's information technology infrastructure is a real problem that still begs a satisfactory solution. The backbone of the ubiquitous information technology infrastructure is formed by distributed systems—distributed …
Continue reading at www.cerias.purdue.edu (PS) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • G06F9/546Message passing systems or structures, e.g. queues
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • G06F9/541Interprogramme communication; Intertask communication via adapters, e.g. between incompatible applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/465Distributed object oriented systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
US12166785B2 (en) Systems and methods for predictive analysis of potential attack patterns based on contextual security information
Borky et al. Protecting information with cybersecurity
Azeez et al. Intrusion detection and prevention systems: an updated review
Agarwal et al. A closer look at intrusion detection system for web applications
Foo et al. ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment
Ghorbani et al. Network intrusion detection and prevention: concepts and techniques
US9774616B2 (en) Threat evaluation system and method
Sobh Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
CN118054973B (en) Active defense method, system, device and medium based on network port lock
Deka et al. Network defense: Approaches, methods and techniques
Marinova-Boncheva A short survey of intrusion detection systems
Kim et al. DSS for computer security incident response applying CBR and collaborative response
Rodríguez et al. Modelling security of critical infrastructures: a survivability assessment
Shameli-Sendi et al. A Retroactive‐Burst Framework for Automated Intrusion Response System
Foo et al. Intrusion response systems: a survey
Lee et al. Assessment of the distributed ledger technology for energy sector industrial and operational applications using the mitre att&ck® ics matrix
Ahmad et al. Security challenges from abuse of cloud service threat
Guelzim et al. Formal methods of attack modeling and detection
Toumi et al. Cooperative Trust Framework Based on Hy-Ids, Firewalls, And Mobile Agents to Enhance Security in A Cloud Environment
US20250039228A1 (en) System and method for attacker interdiction using track and trace user and entity behavior analysis
Rahmawati Advanced Traffic Shaping and Filtering Mechanisms to Combat Phishing Attacks in Integrated E-Commerce Cloud Environments
US20250317466A1 (en) System and Method for Improving Cybersecurity of a Network
Tiwari et al. Cost Tradeoffs for Information Security Assurance.
Gauhar Fatima et al. A Study on Intrusion Detection
El Hayat Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System