You are on page 1of 4

Embedded Auditors for Intrusion Detection A basic cornerstone of security is to verify the integrity of fundamental data stored in the

system. This integrity checking is being achieved using integrity tools such Tripwire, which depend on the integrity and proper operation of the operating system, i.e. these applications assume that the operating system always operates correctly. When this assumption is not valid, the integrity applications cannot provide a reliable result, and consequently may provide a false negative. Once the operating system is compromised, a novice attacker, using tools widely available on the Internet (rootshell.com, etc), could easily defeat integrity tools that rely on the operating system.

A novel way to overcome this traditional integrity problem is to use an independent auditor. The independent auditor uses an out-of-band verification process that does not depend on the underlying operating system. The resultant system provides extremely strong integrity guarantees, detecting modifications to approved objects as well as detecting the existence of unapproved and thus unsigned objects. This is accomplished without any modifications to the host operating system. StrongARM EBSA-285 Evaluation Board, with a SA-110 microprocessor and 21285 core logic can be used as auditors.

These snippets from Web resource, please do read whole report for more information.Book: Intrusion Detection by Rebecca Gurley Bace

Web resources: Using Independent Auditors as Intrusion Detection Systems

IDSIC: A Modeling of Intrusion Detection System with Identification Capability

Palmprint Authentication Application Reliable user authentication is becoming an increasingly important task in the Web-enabled world. The consequences of an insecure authentication system in a corporate or enterprise environment can be catastrophic, and may include loss of confidential information, denial of service, and compromised data integrity. The value of reliable user authentication is not limited to just computer or network access. Palmprint authentication is regarded as one of the efficient biometric trait. Palm consists of the reliable features like palm lines, ridges, texture, etc. Before extracting the features, we need to pre-process and segment the image to obtain the Region of Interest (ROI). While capturing the palm image we also get the fingers and other parts like wrist etc., Segmentation of the palm region from the captured image is an important step before extracting the features. Here texture features are being extracted. They consist of wrinkles, which are different from principle lines in that they are thinner and more irregular. Texture features are being extracted using a technique, namely 2D-Log Gabor filter which has been used to extract the Iris features earlier. Same method can be applied to extract palmprint features and False acceptance rate as well as Genuine acceptance rate can be calculated to evaluate the performance of the biometric system. Web resources: Authentication in Security

Privacy Preserving Data Mining Explosive growth in data storing and data processing technologies has led to the creation of large databases that record unprecedented amount of information. Consequently, with the increase in data storage and processing, concerns about information privacy have emerged. Data mining, with its promise to efficiently discover valuable non-obvious information from large databases, is particularly sensitive to privacy concerns. In recent years, data mining has also endeavored to become compatible with privacy.

Organizations provide assurance of individual privacy and data will be used only for the a well defined purpose. However, it is the common practice of an organization to use individual data for secondary purpose. By secondary purpose, it means that data is being used for which they were not collected initially. Many organizations sell the data to other organizations, which use these data for their own purposes. Thus, the data gets exposed to a number of parties including collectors, owners, users and miners; the privacy of individual is being questioned. Fruitful research has been produced by different researchers on the topic of privacy preserving data mining (PPDM). PPDM deals with the problem of learning accurate models over aggregate data, while protecting privacy at the level of individual records. Recent research in the area of privacy preserving data mining has devoted much effort to determine a trade-off between privacy and the need for knowledge discovery, which is crucial in order to improve decision-making processes and other human activities. Mainly, three approaches are being adopted for privacy preserving data mining namely, heuristic based,

cryptographic based and reconstruction based. Heuristic based techniques are mainly adopted in centralized database scenario, whereas cryptographic based technique finds its application in distributed environment. However, reconstruction based algorithms are well accepted in both centralized as well as the distributed environment.

Book: Privacy Preserving Data Mining (Advances in Information Security) by Jaideep Vaidya , Chris Clifton, Michael Zhu Web resources: Mobile Privacy Preserving Data Mining

You might also like