By Topic

Using Object Metadata to Detect and Tolerate Attacks in Object Storage Devices

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Djemaiel, Y. ; CN&S Res. Lab., Univ. of the 7th of November at Carthage, Carthage ; Boudriga, N.

Storage based intrusion detection techniques have introduced an additional level of protection to interconnected systems and their running services. Such systems perform intrusion detection even if the system is compromised since they satisfy the compromise independent property. Moreover, optimizing intrusion detection and storage requirements is among the urgent needs for storage based intrusion detection solutions. Therefore, introducing these detection capabilities in object storage devices environments may accelerate intrusion detection by reducing processing time and optimize space requirements for detection rules. In this paper, we propose a novel storage based intrusion detection and tolerance system for object based storage devices using a novel structure for detection rules that is based on objects metadata's. A comparative study is given in order to illustrate how the new format of detection rules reduces considerably the processing time for storage based detection modules when performing intrusion detection.

Published in:

Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE

Date of Conference:

Nov. 30 2008-Dec. 4 2008