Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Distributed intrusion detection in clusters based on non-interference

Zimmermann, J. and Mohay, G.

    We present this paper the investigation of a non-interference-based, policy-based intrusion detection system to detect security policy violations in clusters. The Reference Flow Control model has been proposed as a host-based approach for detecting security policy violations. We extend its design to deal with security policies applicable to cluster or grid applications. To achieve distributed intrusion detection, a host-based Reference Flow Control-based intrusion detection system is deployed on all nodes of a cluster. Messaging between the nodes is instrumented in order to enclose the actual message payloads with a small amount of meta-information used for communication between the local IDSes. Finally, we describe a proof-of-concept implementation on Linux/MPICH
Cite as: Zimmermann, J. and Mohay, G. (2006). Distributed intrusion detection in clusters based on non-interference. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds. ACS. 89-95.
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS
 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 16 Nov 2007