MVEE: A Defence Mechanism against Code Injection Attacks

2014 ◽  
Vol 573 ◽  
pp. 565-570
Author(s):  
B. John Samuel ◽  
M. Raja Gughan

The growth of interconnected computer increases the amount and obscurity of attacks. Computer systems require apt security mechanism. Intrusion detection and prevention systems play an important part in detecting and preventing the attacks before they conciliate software. Multi-variant execution environment is an intrusion detection and prevention mechanism that executes several slightly different versions of a program, called variants, in concurrency. The variants are defined as more than 2 same instances. These variants contain the same operational unit of the original program. The variants are built to have indistinguishable manners under normal execution environment. If any of the variant is under attack, there are noticeable divergences in their execution behavior. A monitor compares the execution manners of the variants at specific synchronization points and raises an alarm when a variance is detected.

2019 ◽  
Vol 2019 ◽  
pp. 1-12 ◽  
Author(s):  
R. B. Benisha ◽  
S. Raja Ratna

Intrusion detection and prevention system detects malicious activities that occur in the real-time SCADA systems. This system has a problem without a profound solution. The challenge of the existing intrusion detection is accuracy in the process of detecting the anomalies. In SCADA, wind turbine data are modified by the intruders and forged details are given to the server. To overcome this, the biased intrusion detection system is used for detecting the intrusion with encrypted date, time, and file location with less false-positive and false-negative rates and thereby preventing the SCADA system from further intrusion. It is done in three phases. First, Modified Grey Wolf Optimization (MGWO) is used to extract the features needed for classification and to find the best weight. Second, Entropy-based Extreme Learning Machine (EELM) is used to extort the features and detect the intruded data with its intruded time, file location, and date. Finally, the data are encrypted using the Hybrid Elliptical Curve Cryptography (HECC) to prevent further attack. Experimental results show better accuracy in both detection as well as prevention.


2016 ◽  
Vol 74 ◽  
pp. 98-120 ◽  
Author(s):  
Salman Iqbal ◽  
Miss Laiha Mat Kiah ◽  
Babak Dhaghighi ◽  
Muzammil Hussain ◽  
Suleman Khan ◽  
...  

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 77829-77840 ◽  
Author(s):  
Hussein Alnabulsi ◽  
Rafiqul Islam ◽  
Majharul Talukder

2013 ◽  
Vol 7 (3) ◽  
pp. 664-669
Author(s):  
Dejan Georgiev ◽  
Aristotel Tentov

In this paper we present logical circuits for efficient detection of rolled out contents. As network speed increases and security matters  there is a demand for implementation of hardware based Network Intrusion Detection and Prevention Systems (NIDPS). On the other hand hardware based NIDPS are lacking the flexibility of detection of so named "evasion" techniques. Here we present simple but efficient enhancement to content matching in hardware with minimal basic memory elements (flip-flops) used.


Sign in / Sign up

Export Citation Format

Share Document