Guangzhi Qu, S. Hariri, Santosh Jangiti, Jayprakash Rudraraju, Seungchan Oh, S. Fayssal, Guangsen Zhang, M. Parashar
{"title":"Online monitoring and analysis for self-protection against network attacks","authors":"Guangzhi Qu, S. Hariri, Santosh Jangiti, Jayprakash Rudraraju, Seungchan Oh, S. Fayssal, Guangsen Zhang, M. Parashar","doi":"10.1109/ICAC.2004.42","DOIUrl":null,"url":null,"abstract":"In this paper, we present an online monitoring and analysis framework to achieve self-protection against a wide range of network attacks. Our approach uses the software agents to online monitor several attributes to characterize the state of any network or computing resource as normal, uncertain, or abnormal. The software agents execute the appropriate recovery mechanisms once they determine that a service, and/or a network device is operating abnormally. We have developed a test bed to demonstrate and validate our approach to protect against several well-known attacks.","PeriodicalId":345031,"journal":{"name":"International Conference on Autonomic Computing, 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Autonomic Computing, 2004. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAC.2004.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19
Abstract
In this paper, we present an online monitoring and analysis framework to achieve self-protection against a wide range of network attacks. Our approach uses the software agents to online monitor several attributes to characterize the state of any network or computing resource as normal, uncertain, or abnormal. The software agents execute the appropriate recovery mechanisms once they determine that a service, and/or a network device is operating abnormally. We have developed a test bed to demonstrate and validate our approach to protect against several well-known attacks.