CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Analysis of Mechanisms for Making IDS Fault Tolerant

by Perminder Kaur, Dhavleesh Rattan, Amit Kumar Bhardwaj
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 24
Year of Publication: 2010
Authors: Perminder Kaur, Dhavleesh Rattan, Amit Kumar Bhardwaj
10.5120/563-745

Perminder Kaur, Dhavleesh Rattan, Amit Kumar Bhardwaj . An Analysis of Mechanisms for Making IDS Fault Tolerant. International Journal of Computer Applications. 1, 24 ( February 2010), 22-25. DOI=10.5120/563-745

@article{ 10.5120/563-745,
author = { Perminder Kaur, Dhavleesh Rattan, Amit Kumar Bhardwaj },
title = { An Analysis of Mechanisms for Making IDS Fault Tolerant },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 24 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number24/563-745/ },
doi = { 10.5120/563-745 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:48:12.793493+05:30
%A Perminder Kaur
%A Dhavleesh Rattan
%A Amit Kumar Bhardwaj
%T An Analysis of Mechanisms for Making IDS Fault Tolerant
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 24
%P 22-25
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper is a survey of the work, done for making an IDS fault tolerant. IDS are prone to various attacks and it becomes the natural primary target of hostile attacks with the aim of disabling the detection feature and allowing an attacker to operate without being detected. This paper suggests that intrusion detection system (IDS) must be fault tolerant; otherwise, the intruder may first subvert the IDS then attack the target system at will. Making an IDS fault tolerant is a challenging task.

References
  1. K.N. Levitt, S. Cheung, "Common Techniques in Fault-Tolerance and Security," Proc. of the Dependable Computing for Critical Applications 4, pp. 373-377, 4-6 Jan. 1994,
  2. L. Catuogno, I. Visconti,”A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code.” Proc. of the Third International Conference on Security in Communications Networks, 2002
  3. Shen, Y.P. Tsai, W.-T. Bhattacharya, S. Liu, T,” Attack Tolerant Enhancement Of Intrusion Detection Systems.” Proc. 21st Century Military Communications Conference, Vol 1, pp. 425-429.
  4. Dan Gorton, “Extending Intrusion Detection with Alert Correlation and Intrusion Tolerance” Masters Thesis, 2003
  5. G. H. Kim, E. H. Spafford, “The design and Implementation of Tripwire: A File System Integrity Checker”. Proc. Conference on Computer and Communications Security,Vol 2, pp. 18-29, November 1994
  6. Lindonete Siqueira and Zair Abdelouahab,” A Fault Tolerance Mechanism for Network Intrusion Detection System based on Intelligent Agents (NIDIA).” Proc. The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, and the Second International Workshop on Collaborative Computing, Integration, and Assurance (SEUS-WCCIA'06) , Vol 00, pp. 49-54, 2006
  7. R.Shashikumar and L.C.S. Gouda,” Self-Healing Reconfigurable FPGA Based Fault Tolerant Security Model for Shared Internet Resources” IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009
  8. Pabitra Mohan Khilar, Jitendra Kumar Singh, Sudipta Mahapatra,” Design and Evaluation of a Failure Detection Algorithm for Large Scale Ad Hoc Networks Using Cluster Based Approach” Proc. 2008 International Conference on Information Technology , Vol 00, pp.153-158, 2008.
  9. Liwei Kuang, Mohammad Zulkernine, “"An Intrusion-Tolerant Mechanism for Intrusion Detection Systems," Proc. 2008 Third International Conference on Availability, Reliability and Security, pp.319-326, 2008.
  10. C. KO, “Execution Monitoring of Security-Critical Programs In A Distributed System: A specification Based Approach”, Ph.D. Dissertation, Computer Science Department, University of California at Davis, 1996.
Index Terms

Computer Science
Information Sciences

Keywords

intrusion detection system Fault tolerance