Abstract
In this paper, we define Intrusion Confinement through isolation to address such security issue, its importance and finally present an isolation protocol. Security has emerged as the biggest threat to information systems. System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and trespassers. As a result, serious damage can be caused either because many intrusions are never detected or because the average detection latency is too long.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Graubart, R., Schlipper, L., McCollum, C.: Defending database management systems against information warfare attacks. Technical report, The MITRE Corporation (1996)
Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious transactions. Technical report, George Mason University, Fairfax, VA, http://www.isse.gmu.edu/~pliu/papers/dynamic.ps
Jajodia, S., Liu, P., McCollum, C.: Applicationlevel isolation to cope with malicious database users. In: Proceedings of the 14th Annual Computer Security Application Conference, Phoenix, AZ, pp. 73–82 (1998)
Northcutt, S.: Network Intrusion Detection. New Riders, Indianapolis (1999)
Ilgun, K., Kemmerer, R., Porras, P.: State transition analysis: A rulebased intrusion detection approach. IEEE Transactions on Software Engineering 21(3), 181–199 (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Balitanas, M., Kim, Th. (2010). Insecure Information System’s Solution Using Isolation Method. In: Kim, Th., Fang, Wc., Khan, M.K., Arnett, K.P., Kang, Hj., Ślęzak, D. (eds) Security Technology, Disaster Recovery and Business Continuity. Communications in Computer and Information Science, vol 122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17610-4_32
Download citation
DOI: https://doi.org/10.1007/978-3-642-17610-4_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17609-8
Online ISBN: 978-3-642-17610-4
eBook Packages: Computer ScienceComputer Science (R0)