Teamworking for security : the collaborative approach


Autoria(s): Bye, Rainer; Camtepe, Seyit A.; Albayrak, Sahin
Contribuinte(s)

Seigneu, Jean-Marc

Slagell, Adam

Data(s)

2010

Resumo

Collaborative methods are promising tools for solving complex security tasks. In this context, the authors present the security overlay framework CIMD (Collaborative Intrusion and Malware Detection), enabling participants to state objectives and interests for joint intrusion detection and find groups for the exchange of security-related data such as monitoring or detection results accordingly; to these groups the authors refer as detection groups. First, the authors present and discuss a tree-oriented taxonomy for the representation of nodes within the collaboration model. Second, they introduce and evaluate an algorithm for the formation of detection groups. After conducting a vulnerability analysis of the system, the authors demonstrate the validity of CIMD by examining two different scenarios inspired sociology where the collaboration is advantageous compared to the non-collaborative approach. They evaluate the benefit of CIMD by simulation in a novel packet-level simulation environment called NeSSi (Network Security Simulator) and give a probabilistic analysis for the scenarios.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/57365/

Publicador

IGI Global

Relação

http://eprints.qut.edu.au/57365/1/2BC2010_Camtepe.pdf

DOI:10.4018/978-1-60566-414-9

Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2010) Teamworking for security : the collaborative approach. In Seigneu, Jean-Marc & Slagell, Adam (Eds.) Collaborative Computer Security and Trust Management. IGI Global, pp. 12-33.

Direitos

Copyright 2010 IGI Global.

Fonte

School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty

Palavras-Chave #080303 Computer System Security #080503 Networking and Communications #100503 Computer Communications Networks #Collaborative security #Intrusion detection #Anomaly detection
Tipo

Book Chapter