Entry Pennington:2010:SBI from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Pennington:2010:SBI,
  author =       "Adam G. Pennington and John Linwood Griffin and John
                 S. Bucy and John D. Strunk and Gregory R. Ganger",
  title =        "Storage-Based Intrusion Detection",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "4",
  pages =        "30:1--30:??",
  month =        dec,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1880022.1880024",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jan 12 17:10:07 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Storage-based intrusion detection consists of storage
                 systems watching for and identifying data access
                 patterns characteristic of system intrusions. Storage
                 systems can spot several common intruder actions, such
                 as adding backdoors, inserting Trojan horses, and
                 tampering with audit logs. For example, examination of
                 18 real intrusion tools reveals that most (15) can be
                 detected based on their changes to stored files.
                 Further, an Intrusion Detection System (IDS) embedded
                 in a storage device continues to operate even after
                 client operating systems are compromised. We describe
                 and evaluate a prototype storage IDS, built into a disk
                 emulator, to demonstrate both feasibility and
                 efficiency of storage-based intrusion detection.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries