By Topic

GHIDS: Defending Computational Grids against Misusing of Shared Resources

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Guofu Feng ; Sch. of Electron. & Inf. Eng., Xian Jiaotong Univ. ; Xiaoshe Dong ; Liu, Weizhe ; Ying Chu
more authors

Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional host-based intrusion detecting system (HIDS) is not suitable for grid environment. Grid-specific attacks are different from traditional ones, and traditional HIDS can not recognize a grid user and always with high performance overhead. This paper proposes a grid-specific host-based intrusion detection system (GHIDS) which employs bottleneck verification approach to detect intrusions with low false alarm rate and high detection rate. Working within operating system kernel and performing bottleneck verification by integer comparison, GHIDS achieves high efficiency and accuracy. Security reports generated by GHIDS are indexed not only by local user ID, but also by grid user ID. That is more useful for analyzing grid user behaviors globally by both host administrators and high level grid-based IDS

Published in:

Services Computing, 2006. APSCC '06. IEEE Asia-Pacific Conference on

Date of Conference:

Dec. 2006