透過您的圖書館登入
IP:18.117.196.184
  • 期刊

Mitigation of Insider Risks Using Distributed Agent Detection, Filtering, and Signaling

並列摘要


An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tampering-point introduces vulnerabilities, especially from knowledgeable insiders capable of abusing security-critical resources. In the Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions (CONFIDANT), the mechanisms for tampering detection, decision-making, and alert signaling are distributed and corroborated by autonomous agents. In this paper, the CONFIDANT file integrity verification framework is presented focusing on insider defense aspects. User capability classes are defined and critical physical tampering points in intrusion detection architectures are identified. CONFIDANT mitigation techniques of insider tampering exposures and example scenarios are presented.

被引用紀錄


Tai, Y. T. (2007). 最佳化字串比對演算法設計針對記憶體架構病毒偵測系統 [master's thesis, National Tsing Hua University]. Airiti Library. https://doi.org/10.6843/NTHU.2007.00105
呂育辰(2015)。展演藝術媒合平台策略- 以Needer 。你的網站為例〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2015.02548
陳品融(2014)。探討網路新創企業的轉變歷程 - 商業生態系統觀點〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2014.00025
周建宏(2011)。室內對講機產業分析與既有廠商應對策略之研究〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2011.00932
Shrestha, H. K. (2010). 基因改造玉米檢測方法之開發及尼泊爾基改玉米現狀之監測 [doctoral dissertation, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2010.02475

延伸閱讀