A framework for distributed intrusion detection systems

Download
2002
Öztosun, Ümit
Emergence of intrusion detection systems (IDSs) has leveraged the security of infor mation systems. However, they also introduced new problems. Plethora of intrusion detection systems are in common use today, using various different ways and tech niques for intrusion detection. It is not uncommon to see an information system uti lizes different IDSs, in order to combine advantages and to reduce disadvantages of individual systems. This often results in a confusion of systems that output informa tion in different formats, together with the management overhead of these distinct systems. Information produced by IDSs should be unified and methods to increase manageability of these systems should be introduced. In this thesis, a framework that provides interoperability of different IDSs is proposed. This work utilizes IETF (Inter net Engineering Task Force) IDWG (Intrusion Detection Work Group) draft proposals to ensure compatibility with upcoming standards. The proposed framework has been verified by the developed prototype system.

Suggestions

A Control System Architecture for Control of Non-Affine in Control, Open-Loop Unstable Underactuated Systems
Marangoz, Alp; Kutay, Ali Türker (2017-07-25)
In this paper, a control system architecture for control of non-affine in control, open-loop unstable underactuated system is discussed. Passivization of the unactuated (internal) system dynamics achieved through perturbation of trajectories of the actuated states, which are calculated through adaptive dynamic inversion technique, based on Tikhonov's theorem. Performance of the controller is shown through simulation of two open-loop unstable and locally uncontrollable example problems.
A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions
Sonmez, Ferda Ozdemir; Günel Kılıç, Banu (2021-09-01)
Types and complexity of information security related vulnerabilities are growing rapidly and present numerous challenges to the enterprises. One of the key challenges is to identify the optimal set of precautions with limited budget. Despite the fact that majority of enterprises have a budget constraint for installing and maintaining the protection systems, the majority of the previous work only focus on prioritization of security targets and do not consider the preventative actions and budget constraints. ...
A FRAMEWORK FOR DETECTING COMPLEX EVENTS IN SURVEILLANCE VIDEOS
Onal, Itir; Kardas, Karani; Rezaeitabar, Yousef; Bayram, Ulya; Bal, Murat; Ulusoy, İlkay; Cicekli, Nihan Kesim (2013-07-19)
This paper presents a framework for detecting complex events in surveillance videos. Moving objects in the foreground are detected in the object detection component of the system. Whether these foregrounds are human or not is decided in the object recognition component. Then each detected object is tracked and labeled in the object tracking component, in which true labeling of objects in the occlusion situation is also provided. The extracted information is fed to the event detection component. Rule based e...
AN OPTIMISTIC LOCKING TECHNIQUE FOR CONCURRENCY-CONTROL IN DISTRIBUTED DATABASES
Halıcı, Uğur (1991-07-01)
An optimistic scheme, called ODL, which uses dummy locks to test the validity of a transaction for concurrency control in distributed database systems, is suggested. The dummy locks are long-term locks; however, they do not conflict with any other lock. By the use of long-term dummy locks, the need for the information about the write sets of validated transactions is eliminated and during the validation test only the related sites are checked. Also, the transactions to be aborted are immediately recogniz...
A Computationally Efficient Topology Identifiability Analysis of Distribution Systems
Eser, Fatih; Yılmaz, Uğur Can; Dursun, Erk; Cinalioglu, Mustafa Cihan; Göl, Murat (2022-07-01)
© 2022 Elsevier B.V.Because of the lack of a proper real-time monitoring system at distribution power networks, topology identification can not be performed properly. While in traditional radial structures the topology is unique, in the presence of an open-ring structure, this issue constitutes a risk for the operation of the system, and the safety of the field staff in contact with the system components. Many studies in literature considers this problem in the scope of observability, however having a compl...
Citation Formats
Ü. Öztosun, “A framework for distributed intrusion detection systems,” M.S. - Master of Science, Middle East Technical University, 2002.