Isolation Solution for Insecure Information Systems

نویسندگان

  • MARICEL BALITANAS
  • TAI-HOON KIM
چکیده

Security has emerged as the biggest threat to information systems. System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and trespassers. As a result, serious damage can be caused either because many intrusions are never detected or because the average detection latency is too long. In this paper, we define Intrusion Confinement through isolation to address such security issue, its importance and finally present an isolation protocol. Keyword: Intrusion detection, Isolation, Information Systems

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Insecure Context Switching: Inoculating Regular Expressions for Survivability

For most computer end–users, web browsers and Internet services act as the providers and protectors of their personal information, from bank accounts to personal correspondence. These systems are critical to users’ continued lifestyles but often show no evidence of survivability [43], or robustness against present and future attacks. Software defects, considered the largest risk to survivabilit...

متن کامل

Sanctum: Minimal Hardware Extensions for Strong Software Isolation

Sanctum offers the same promise as SGX, namely strong provable isolation of software modules running concurrently and sharing resources, but protects against an important class of additional software attacks that infer private information from a program’s memory access patterns. We follow a principled approach to eliminating entire attack surfaces through isolation, rather than plugging attack-...

متن کامل

Pnm-25: Nursing Information Systems: Issues and Challenges

Background: The nursing process is often considered as core of the nursing care delivery and guides the care documentation. Currently, with rapid advance in Information and Communication Technology (ICT) this process can be supported electronically. Applying information systems improves care health processes. Nursing Information Systems (NISs) deal with nursing process. Materials and Methods: E...

متن کامل

Online Fault Detection and Isolation Method Based on Belief Rule Base for Industrial Gas Turbines

Real time and accurate fault detection has attracted an increasing attention with a growing demand for higher operational efficiency and safety of industrial gas turbines as complex engineering systems. Current methods based on condition monitoring data have drawbacks in using both expert knowledge and quantitative information for detecting faults. On account of this reason, this paper proposes...

متن کامل

Application of Shape Memory Alloys in Seismic Isolation: A Review

In the last two decades, there has been an increasing interest in structural engineering control methods. Shape memory alloys and seismic isolation systems are examples of passive control systems that use of any one alone, effectively improve the seismic performance of the structure. Characteristics such as large strain range without any residual deformation, high damping capacity, excellent re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010