• DocumentCode
    377006
  • Title

    The monitoring, detection, interpretation and response paradigm for the security of battlespace networks

  • Author

    Cabrera, João B D ; Popyack, Leonard J. ; Lewis, Lundy ; Ravichandran, B. ; Mehra, Raman K.

  • Author_Institution
    Sci. Syst. Co., Woburn, MA, USA
  • Volume
    1
  • fYear
    2001
  • fDate
    2001
  • Firstpage
    102
  • Abstract
    Modern battlespace networks are too complex to be defended using only the traditional shielding techniques of cryptography, authentication and static firewalls. Implicit in much of the current research devoted to applying data based techniques to network security is the paradigm of monitoring, detection, interpretation and response (MDIR). Under MDIR, shielding technologies are still present, but the designer accepts the possibility of external attacks, insider´s misuse, and vulnerable application software, and constantly monitors the network for detecting abnormalities. Previous work by the authors on a research testbed has shown that the COTS network management systems (NMSs) combined with anomaly detection and other statistical techniques can be successfully used for data monitoring, and for automatically detecting correlations among attacker events and target events during distributed denial of service attacks introduced by hacker toolkits. This paper examines the MDIR paradigm, and reviews these experiments within its background.
  • Keywords
    correlation methods; cryptography; message authentication; military communication; telecommunication network management; telecommunication security; COTS network management systems; MDIR paradigm; anomaly detection; attacker events correlation detection; authentication; battlespace networks security; cryptography; data monitoring; distributed denial of service attacks; external attacks; hacker toolkits; insider misuse; monitoring detection interpretation response paradigm; network security; research testbed; shielding techniques; static firewalls; statistical techniques; vulnerable application software; Application software; Authentication; Automatic testing; Computer crime; Computer hacking; Computerized monitoring; Cryptography; Data security; Event detection; System testing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE
  • Print_ISBN
    0-7803-7225-5
  • Type

    conf

  • DOI
    10.1109/MILCOM.2001.985771
  • Filename
    985771