Please use this identifier to cite or link to this item:
https://doi.org/10.1007/s10207-011-0130-9
DC Field | Value | |
---|---|---|
dc.title | Enhancing host security using external environment sensors | |
dc.contributor.author | Chang, E.-C. | |
dc.contributor.author | Lu, L. | |
dc.contributor.author | Wu, Y. | |
dc.contributor.author | Yap, R.H.C. | |
dc.contributor.author | Yu, J. | |
dc.date.accessioned | 2013-07-23T09:25:57Z | |
dc.date.available | 2013-07-23T09:25:57Z | |
dc.date.issued | 2011 | |
dc.identifier.citation | Chang, E.-C., Lu, L., Wu, Y., Yap, R.H.C., Yu, J. (2011). Enhancing host security using external environment sensors. International Journal of Information Security 10 (5) : 285-299. ScholarBank@NUS Repository. https://doi.org/10.1007/s10207-011-0130-9 | |
dc.identifier.issn | 16155262 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/43136 | |
dc.description.abstract | We propose a framework that uses (external) environment information to enhance computer security. The benefit of our framework is that the environment information is collected by sensors that are outside the control of a host and communicate to an external monitor via an out-of-band channel (w.r.t. the host), thus it cannot be compromised by malware on a host system. The information gathered still remains intact even if malware uses rootkit techniques to hide its activities. Our framework can be applied for a number of security applications: (1) intrusion detection; (2) rate monitoring/control of external resources; and (3) access control. We show that that the framework is useful even with coarse-grained and simple information. We present some experimental prototypes that employ the framework to detect/control email spam, detect/control DDoS zombie attacks and detect misuse of compute resources. Experimental evaluation shows that the framework is effecting in detecting or limiting the activities of such malware. The growing popularity of multimodal sensors and physical security information management systems suggests that such environmental sensors will become common making our framework cost effective and feasible in the near future. © 2011 Springer-Verlag. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/s10207-011-0130-9 | |
dc.source | Scopus | |
dc.subject | Access control | |
dc.subject | Host security | |
dc.subject | Intrusion detection | |
dc.subject | Malware | |
dc.subject | Rootkit | |
dc.subject | Sensors | |
dc.subject | Spam | |
dc.type | Article | |
dc.contributor.department | COMPUTATIONAL SCIENCE | |
dc.contributor.department | TEMASEK LABORATORIES | |
dc.description.doi | 10.1007/s10207-011-0130-9 | |
dc.description.sourcetitle | International Journal of Information Security | |
dc.description.volume | 10 | |
dc.description.issue | 5 | |
dc.description.page | 285-299 | |
dc.identifier.isiut | 000295087900003 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.