Title :
The monitoring, detection, interpretation and response paradigm for the security of battlespace networks
Author :
Cabrera, João B D ; Popyack, Leonard J. ; Lewis, Lundy ; Ravichandran, B. ; Mehra, Raman K.
Author_Institution :
Sci. Syst. Co., Woburn, MA, USA
Abstract :
Modern battlespace networks are too complex to be defended using only the traditional shielding techniques of cryptography, authentication and static firewalls. Implicit in much of the current research devoted to applying data based techniques to network security is the paradigm of monitoring, detection, interpretation and response (MDIR). Under MDIR, shielding technologies are still present, but the designer accepts the possibility of external attacks, insider´s misuse, and vulnerable application software, and constantly monitors the network for detecting abnormalities. Previous work by the authors on a research testbed has shown that the COTS network management systems (NMSs) combined with anomaly detection and other statistical techniques can be successfully used for data monitoring, and for automatically detecting correlations among attacker events and target events during distributed denial of service attacks introduced by hacker toolkits. This paper examines the MDIR paradigm, and reviews these experiments within its background.
Keywords :
correlation methods; cryptography; message authentication; military communication; telecommunication network management; telecommunication security; COTS network management systems; MDIR paradigm; anomaly detection; attacker events correlation detection; authentication; battlespace networks security; cryptography; data monitoring; distributed denial of service attacks; external attacks; hacker toolkits; insider misuse; monitoring detection interpretation response paradigm; network security; research testbed; shielding techniques; static firewalls; statistical techniques; vulnerable application software; Application software; Authentication; Automatic testing; Computer crime; Computer hacking; Computerized monitoring; Cryptography; Data security; Event detection; System testing;
Conference_Titel :
Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE
Print_ISBN :
0-7803-7225-5
DOI :
10.1109/MILCOM.2001.985771