• DocumentCode
    2895897
  • Title

    Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention

  • Author

    Alsubhi, Khalid ; Aib, Issam ; François, Jérôme ; Boutaba, Raouf

  • Author_Institution
    David R. Cheriton Sch. of Comput. Sci., Univ. of Waterloo, Waterloo, ON, Canada
  • fYear
    2009
  • fDate
    14-18 June 2009
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Intrusion detection and/or prevention systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of an enterprise information system. IDPSes can be network or host-based and can collaborate in order to provide better detections of malicious traffic. Although several IDPS systems have been proposed, their appropriate configuration and control for effective detection and prevention of attacks has always been far from trivial. Another concern is related to the slowing down of system performance when maximum security is applied, hence the need to trade off between security enforcement levels and the performance and usability of an enterprise information system. In this paper we motivate the need for and present a policy-based framework for the configuration and control of the security enforcement mechanisms of an enterprise information system. The approach is based on dynamic adaptation of security measures based on the assessment of system vulnerability and threat prediction and provides several levels of attack containment. As an application, we have implemented a dynamic policy-based adaptation mechanism between the Snort signature-based IDPS and the light weight anomaly-based FireCollaborator IDS. Experiments conducted over the DARPA 2000 and 1999 intrusion detection evaluation datasets show the viability of our framework.
  • Keywords
    business data processing; computer networks; configuration management; telecommunication security; telecommunication traffic; FireCollaborator IDS; IDPS system; Snort signature; attack containment; attack detection; attack prevention; dynamic policy-based adaptation mechanism; enterprise information system; intrusion detection; intrusion prevention; malicious traffic; policy-based security configuration management; security enforcement; system performance; system usability; system vulnerability; threat prediction; Collaboration; Communication system traffic control; Computer security; Control systems; Data security; Information security; Information systems; Intrusion detection; Risk management; System performance;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications, 2009. ICC '09. IEEE International Conference on
  • Conference_Location
    Dresden
  • ISSN
    1938-1883
  • Print_ISBN
    978-1-4244-3435-0
  • Electronic_ISBN
    1938-1883
  • Type

    conf

  • DOI
    10.1109/ICC.2009.5199341
  • Filename
    5199341