The design and implementation of tripwire: a file system integrity checker
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Intrusion detection using autonomous agents
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
An architectural support for self-adaptive software for treating faults
WOSS '02 Proceedings of the first workshop on Self-healing systems
An intrusion tolerance approach for protecting network infrastructures
An intrusion tolerance approach for protecting network infrastructures
Using internal sensors for computer intrusion detection
Using internal sensors for computer intrusion detection
Towards Survivable Intrusion Detection System
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 - Volume 9
Cryptography and Network Security (4th Edition)
Cryptography and Network Security (4th Edition)
SEUS-WCCIA '06 Proceedings of the The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, and the Second International Workshop on Collaborative Computing, Integration, and Assurance (SEUS-WCCIA'06)
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
ICIT '08 Proceedings of the 2008 International Conference on Information Technology
ASSURE: automatic software self-healing using rescue points
Proceedings of the 14th international conference on Architectural support for programming languages and operating systems
Hi-index | 0.00 |
In accordance with the increasing importance of intrusion detection systems (IDS), users justifiably demand the trustworthiness of the IDS. However, IDS themselves are prone to various attacks and it becomes the natural primary target of hostile attacks with the aim of disabling the detection feature and allowing an attacker to operate without being detected. This paper suggests that intrusion detection system (IDS) must be fault tolerant; otherwise, the intruder may first subvert the IDS then attack the target system at will. Making an IDS fault tolerant [2] is a challenging task. The aim of this research paper is to enhance the fault tolerance of IDS using AES and DES based heart beat events. Brute Force attack has been simulated and the effectiveness of encrypted heartbeat event based fault tolerance for Intrusion Detection System is evaluated.