The 2008 International Conference on High performance Computing & Simulation
June 3 - 6, 2008, Nicosia, Cyprus
INVITED TALK II
Ubiquitous Intrusion Detection
LIFC, University of Franche Comté
The traditional way of protecting networks and applications with e.g., firewalls and encryption, is no longer sufficient to protect effectively emerging 4G networks. Intrusion detection mechanisms should be coupled with preventive measures so as to identify unauthorized abuses. We present some of the challenges in designing efficient intrusion detection system using network-management inspired techniques. Basically, the logs that are generated by any application/service, layer of the protocol stack or resource (e.g., router), are collected so as to provide a global view of the supervised system based on which complex and distributed intrusions can be detected. Distribution capabilities and extensive coordination capabilities should also be provided for guarantying that both the network and the computing components do not constitute isolated entities largely unaware of each others.