SLIDE 1
INTRODUCTION : Intrusion Response
- Vulnerabilities continuously discovered
- Patches not always possible
- Intrusion detection cuts exposure
- Previous responses aimed at threat
- We curtail consequence
- Cryptography / Replication expensive
Augmenting Storage with an Intrusion Response Primitive to Ensure - - PowerPoint PPT Presentation
Augmenting Storage with an Intrusion Response Primitive to Ensure the Security of Critical Data Ashish Gehani Surendar Chandra University of Notre Dame & Gershon Kedem Duke University 1 INTRODUCTION : Intrusion Response
Intrusion Detector Capability Filesystem API Manager Write Unsigned Data Read Unencrypted Data Read Encrypted Data Write Signed Data
Application Public/Private Keys Control Write Signed Encrypted Delta Remote Node Filesystem