{"title":"用于入侵检测的集群进程监控工具:概念验证","authors":"W. Yurcik, Xin Meng, G. Koenig","doi":"10.1109/LCN.2004.1","DOIUrl":null,"url":null,"abstract":"Large-scale commodity cluster systems are finding increasing deployment in academic, research, and commercial settings. As a direct result of this popularity, cluster systems are also under increasing security threats. Unfortunately, there have been no corresponding improvements in security tools that specifically address the unique needs of cluster security. The paper describes an ongoing research effort at the National Center for Supercomputing Applications to develop tools for managing cluster security via process monitoring. We describe an extensible architecture and present details of a prototype process monitoring tool focused on intrusion detection.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A cluster process monitoring tool for intrusion detection: proof-of-concept\",\"authors\":\"W. Yurcik, Xin Meng, G. Koenig\",\"doi\":\"10.1109/LCN.2004.1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Large-scale commodity cluster systems are finding increasing deployment in academic, research, and commercial settings. As a direct result of this popularity, cluster systems are also under increasing security threats. Unfortunately, there have been no corresponding improvements in security tools that specifically address the unique needs of cluster security. The paper describes an ongoing research effort at the National Center for Supercomputing Applications to develop tools for managing cluster security via process monitoring. We describe an extensible architecture and present details of a prototype process monitoring tool focused on intrusion detection.\",\"PeriodicalId\":366183,\"journal\":{\"name\":\"29th Annual IEEE International Conference on Local Computer Networks\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-11-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"29th Annual IEEE International Conference on Local Computer Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCN.2004.1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"29th Annual IEEE International Conference on Local Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.2004.1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A cluster process monitoring tool for intrusion detection: proof-of-concept
Large-scale commodity cluster systems are finding increasing deployment in academic, research, and commercial settings. As a direct result of this popularity, cluster systems are also under increasing security threats. Unfortunately, there have been no corresponding improvements in security tools that specifically address the unique needs of cluster security. The paper describes an ongoing research effort at the National Center for Supercomputing Applications to develop tools for managing cluster security via process monitoring. We describe an extensible architecture and present details of a prototype process monitoring tool focused on intrusion detection.