Online faults/attacks detection and recovery

Guangzhi Qu, Salim A Hariri, George Sneij, Jionghua Jin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The Internet has been growing at an amazing rate and concurrent with the growth, the vulnerability of the Internet is also increasing. Though the Internet has been designed to withstand various forms of failure, the intrusion tools and attacks are becoming increasingly sophisticated, exposing the Internet to new threats. To make networked systems reliable and robust it becomes highly essential to develop on-line monitoring, analysis, quantification of the behavior of networks under a wide range of faults/attacks and detection and recovery the network system from attacks/faults. In this paper, we present an agent-based architecture to detect and recover the system from network attacks/faults. Our approach is based on deploying software agents on selected routers, clients and servers to continuously monitor the vulnerability metrics that can be used to quantify the operational state of any network component (router, client, server, sub network). With the help of the proposed autonomous network attack defense system, we can fulfill (a) online modeling and profiling infrastructure vulnerability, (b) quick network attack source identification and (c) proactive self-healing of the network attack.

Original languageEnglish (US)
Title of host publicationProceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology
EditorsM.H. Hamza, M.H. Hamza
Pages37-42
Number of pages6
StatePublished - 2003
EventProceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology - Scottdale, AZ, United States
Duration: Nov 17 2003Nov 19 2003

Other

OtherProceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology
CountryUnited States
CityScottdale, AZ
Period11/17/0311/19/03

Fingerprint

Internet
Recovery
Routers
Servers
Network components
Software agents
Fault detection
Side channel attack
Monitoring

Keywords

  • Attack detection
  • Online monitoring
  • Recovery

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Qu, G., Hariri, S. A., Sneij, G., & Jin, J. (2003). Online faults/attacks detection and recovery. In M. H. Hamza, & M. H. Hamza (Eds.), Proceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology (pp. 37-42)

Online faults/attacks detection and recovery. / Qu, Guangzhi; Hariri, Salim A; Sneij, George; Jin, Jionghua.

Proceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology. ed. / M.H. Hamza; M.H. Hamza. 2003. p. 37-42.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Qu, G, Hariri, SA, Sneij, G & Jin, J 2003, Online faults/attacks detection and recovery. in MH Hamza & MH Hamza (eds), Proceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology. pp. 37-42, Proceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology, Scottdale, AZ, United States, 11/17/03.
Qu G, Hariri SA, Sneij G, Jin J. Online faults/attacks detection and recovery. In Hamza MH, Hamza MH, editors, Proceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology. 2003. p. 37-42
Qu, Guangzhi ; Hariri, Salim A ; Sneij, George ; Jin, Jionghua. / Online faults/attacks detection and recovery. Proceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology. editor / M.H. Hamza ; M.H. Hamza. 2003. pp. 37-42
@inproceedings{18b234c38e534702872b6a91b87f95b3,
title = "Online faults/attacks detection and recovery",
abstract = "The Internet has been growing at an amazing rate and concurrent with the growth, the vulnerability of the Internet is also increasing. Though the Internet has been designed to withstand various forms of failure, the intrusion tools and attacks are becoming increasingly sophisticated, exposing the Internet to new threats. To make networked systems reliable and robust it becomes highly essential to develop on-line monitoring, analysis, quantification of the behavior of networks under a wide range of faults/attacks and detection and recovery the network system from attacks/faults. In this paper, we present an agent-based architecture to detect and recover the system from network attacks/faults. Our approach is based on deploying software agents on selected routers, clients and servers to continuously monitor the vulnerability metrics that can be used to quantify the operational state of any network component (router, client, server, sub network). With the help of the proposed autonomous network attack defense system, we can fulfill (a) online modeling and profiling infrastructure vulnerability, (b) quick network attack source identification and (c) proactive self-healing of the network attack.",
keywords = "Attack detection, Online monitoring, Recovery",
author = "Guangzhi Qu and Hariri, {Salim A} and George Sneij and Jionghua Jin",
year = "2003",
language = "English (US)",
isbn = "0889863989",
pages = "37--42",
editor = "M.H. Hamza and M.H. Hamza",
booktitle = "Proceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology",

}

TY - GEN

T1 - Online faults/attacks detection and recovery

AU - Qu, Guangzhi

AU - Hariri, Salim A

AU - Sneij, George

AU - Jin, Jionghua

PY - 2003

Y1 - 2003

N2 - The Internet has been growing at an amazing rate and concurrent with the growth, the vulnerability of the Internet is also increasing. Though the Internet has been designed to withstand various forms of failure, the intrusion tools and attacks are becoming increasingly sophisticated, exposing the Internet to new threats. To make networked systems reliable and robust it becomes highly essential to develop on-line monitoring, analysis, quantification of the behavior of networks under a wide range of faults/attacks and detection and recovery the network system from attacks/faults. In this paper, we present an agent-based architecture to detect and recover the system from network attacks/faults. Our approach is based on deploying software agents on selected routers, clients and servers to continuously monitor the vulnerability metrics that can be used to quantify the operational state of any network component (router, client, server, sub network). With the help of the proposed autonomous network attack defense system, we can fulfill (a) online modeling and profiling infrastructure vulnerability, (b) quick network attack source identification and (c) proactive self-healing of the network attack.

AB - The Internet has been growing at an amazing rate and concurrent with the growth, the vulnerability of the Internet is also increasing. Though the Internet has been designed to withstand various forms of failure, the intrusion tools and attacks are becoming increasingly sophisticated, exposing the Internet to new threats. To make networked systems reliable and robust it becomes highly essential to develop on-line monitoring, analysis, quantification of the behavior of networks under a wide range of faults/attacks and detection and recovery the network system from attacks/faults. In this paper, we present an agent-based architecture to detect and recover the system from network attacks/faults. Our approach is based on deploying software agents on selected routers, clients and servers to continuously monitor the vulnerability metrics that can be used to quantify the operational state of any network component (router, client, server, sub network). With the help of the proposed autonomous network attack defense system, we can fulfill (a) online modeling and profiling infrastructure vulnerability, (b) quick network attack source identification and (c) proactive self-healing of the network attack.

KW - Attack detection

KW - Online monitoring

KW - Recovery

UR - http://www.scopus.com/inward/record.url?scp=1542434084&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=1542434084&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:1542434084

SN - 0889863989

SN - 9780889863989

SP - 37

EP - 42

BT - Proceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology

A2 - Hamza, M.H.

A2 - Hamza, M.H.

ER -