CFP last date
20 June 2024
Reseach Article

MAZE Security Protocol for Self Securing S4 Storage Server

Published on November 2012 by Alok G, N R Sunitha
Issues and Challenges in Networking, Intelligence and Computing Technologies
Foundation of Computer Science USA
ICNICT - Number 5
November 2012
Authors: Alok G, N R Sunitha
a8deb901-46fc-46c4-a644-db06fad4407f

Alok G, N R Sunitha . MAZE Security Protocol for Self Securing S4 Storage Server. Issues and Challenges in Networking, Intelligence and Computing Technologies. ICNICT, 5 (November 2012), 13-17.

@article{
author = { Alok G, N R Sunitha },
title = { MAZE Security Protocol for Self Securing S4 Storage Server },
journal = { Issues and Challenges in Networking, Intelligence and Computing Technologies },
issue_date = { November 2012 },
volume = { ICNICT },
number = { 5 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 13-17 },
numpages = 5,
url = { /specialissues/icnict/number5/9443-1027/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Issues and Challenges in Networking, Intelligence and Computing Technologies
%A Alok G
%A N R Sunitha
%T MAZE Security Protocol for Self Securing S4 Storage Server
%J Issues and Challenges in Networking, Intelligence and Computing Technologies
%@ 0975-8887
%V ICNICT
%N 5
%P 13-17
%D 2012
%I International Journal of Computer Applications
Abstract

Storage area network (SAN) is an emerging technology in the industry with the capability to handle ever growing requirement for data storage in any enterprise. The flexibility provided by storage area network also opens up major security concerns. The security protocols designed for self securing S4 storage server have focused on recovery from intruder attacks and corruption of data by extensive reliance on Audit logs, History pool and Journal based metadata; after the act of intrusion is detected. In this paper, we propose MAZE security protocol, which uses Decoy Documents to isolate the intruder on the fly, in the act, at the time of crime. We also analyze the efficiency of the protocol on a virtual test bed.

References
  1. Adam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A. N. Soules, Garth R. Goodson, Gregory R. Ganger "Storage-based Intrusion Detection: Watching storage activity for suspicious behavior" - Proceedings of 12th USENIX Security Symposium, Washington, D. C. , Aug 4-8, 2003. Supercedes Carnegie Mellon University SCS Technical Report CMU-CS-02-179, September 2002.
  2. John. D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules, and Gregory R. Ganger. Self-securing storage: protecting data in compromised systems. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation, October 2000.
  3. Bowen, B. M. , Kemerlis, V. P. , Prabhu, P. , Keromytis, A. D. , Stolfo, S. J. : "Automating the injection of believable decoys to detect snooping. " In: Proceedings of the third ACM Conference on Wireless Network Security (WiSec). pp. 81{86 (2010)
  4. "Storage Area Networks: Data Security and Fabric Management" – White Paper Product Management March 2002 Datalink.
  5. Bowen, B. M. , Hershkop, S. , Keromytis, A. D. , Stolfo, S. J. : Baiting Inside Attackers Using Decoy Documents. In: Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm). pp. 51-70 (September 2009)
  6. Bowen, B. M. ; Ben Salem, M. ; Hershkop, S. ; Keromytis, A. D. ; Stolfo, S. J. ; , "Designing Host and Network Sensors to Mitigate the Insider Threat," Security & Privacy, IEEE , vol. 7, no. 6, pp. 22-29, Nov. -Dec. 2009
  7. Brian M. Bowen, "Design and Analysis of Decoy Systems for Computer Security" - Columbia University 2011.
  8. Tate, J. , Lucchese, F. , and Moore, R. Introduction to Storage Area Networks, United States: Vervante, September 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Decoy Documents Maze Storage Area Network Sand-trap Sand-box Spike