If grid computations and data distribution aren’t
seamless to users the usefulness of a grid would be
minimal, but if all the systems blindly trusted each
other it would be very easy for attackers to gain
access to many systems by getting in to any system
in the grid. It would also allow worms to spread
very quickly if they weren’t challenged once one
grid system was infected.
Many grid computing farms use the Grid
Security Infrastructure (GSI) model, which is based
on Public Key Infrastructure (PKI) to give each user
and resource a unique identifier. Users need to
authenticate to access any grid resources, and
resources ACLs are based on the unique identifier
given to the users. However not all GSI grid
systems are protected, as not all software running on
grids are GSI-compatible, and the required key
management can be cumbersome on large grids.
The final technology we will review in relation
to intrusion detection and automated attack
prevention is virtualization. Virtualization allows
multiple operating systems to run on one piece of
hardware without them knowing they are on a
shared system. The OSes that are virtualized are
known as guests, and the OS they run under is
known as the host.
From a security perspective virtualization means
that if a worm or attack can infect the host, it could
take down the guests on the host making a DoS
attack much more effective. If a DoS attack takes
down a non-virtualized system only one OS is
affected, but the number of affected systems would
be much higher in a virtual infrastructure.
Virtualization technology could also be used to
identify or respond to attacks. If the host layer of a
virtualized system is secure the host could possibly
identify and respond to attacks on the guests. If a
guest OS was being attacked and was prevented
from talking on the network the host may be able to
respond to the attack without needing the guest
active.
5 CONCLUSION
As we have seen there has been much research in the
areas of intrusion detection and intrusion response.
Much of this research has been focused on
automated attacks such as worms, DDoS, and DoS
attacks. As automated attack writers produce more
efficient attacks, and the number of hosts on
networks grow, the need for quick detection and
response is crucial.
With worms being able to affect large number of
hosts in seconds, and no current systems which can
close down these vulnerabilities with such short
notice, there is currently a technology gap between
the attackers and those trying to protect systems.
Current research is closing this gap, and as new
technologies are introduced into networks and
computer systems there is opportunity for smarter
and faster response to attacks. However these new
technologies also bring with them new insecurities.
The process of using new technologies to
prevent security issues being followed by newer
exploits will most certainly continue indefinitely, but
in the area of preventing and responding to
automated attacks there is a strong need to improve
intrusion detection and response technologies, which
currently cannot process or respond to threats as
quickly as attacks can be generated.
REFERENCES
Denning, D. (1986). An Intrusion-Detection Model. 1986
IEEE Symposium on Security and Privacy.
DShield. (October 2004). DShield Records Added
Report. Retrieved October 17, 2004, from the DShield
Web site:
http://www.dshield.org.
Gorodetski, V., Kotenko, I. & Karsaev, O. (July 2003).
Multi-agent technologies for computer network
security. International Journal of Computer Systems
Science & Engineering, Volume 18, Number 4. 191-
200.
Internet Storm Center. (October 2004). Average Time
Between Attacks: Survival Time. Retrieved October
17, 2004, from the Internet Storm Center Web site:
http://isc.sans.org.
Kreibich, C. & Crowcroft, J. (January 2004). Honeycomb
– Creating Intrusion Detection Signatures Using
Honeypots. ACM SIGCOMM Computer
Communications Review, Volume 34, Number 1. 51-
56.
Lemos, R. (January 31, 2003). Counting The Cost of
Slammer. CNet News. Retrieved October 16, 2004,
from the CNet News Web site:
http://surveys.cnet.com/2100-1001-982955.html.
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford,
S., & Weaver, N. (2003). Inside the Slammer Worm.
IEEE Security & Privacy. 33-39.
Tupakula, U. & Varadharajan, V. (2003). A Practical
Method to Counteract Denial of Service Attacks.
Retrieved October 23, 2003 from the Conferences in
Research Web site:
http://crpit.com/confpapers/CRPITV16Tupakula.pdf.
Zou, C., Gao, L, Gong, W., & Towsley, D. (2003).
Monitoring and Early Warning for Internet Worms.
Proceedings of the CCC’03 Conference, 190-199.
INTRUSION DETECTION AND RESPONSE TO AUTOMATED ATTACKS
525