first round clemence comments
This commit is contained in:
parent
3bdc87913c
commit
987cc4ce8b
5 changed files with 14 additions and 15 deletions
|
|
@ -116,10 +116,10 @@ This design makes the result of the detection trustworthy only when the target i
|
|||
This observation leads to the conclusion that we cannot entrust machines to assess their own integrity.
|
||||
To remain trustworthy, the IDS must be independent of the target and require no cooperation to perform the detection.
|
||||
The main challenge with such a system is collecting relevant data.
|
||||
The main example of such a system are Network-based IDS (NIDS).
|
||||
NIDS exhibit complete independence, but their input data --- network communication from the machine --- is only relevant for a small subset of attacks.
|
||||
The main example of such a system are Network-based IDSs (NIDSs).
|
||||
NIDSs exhibit complete independence, but their input data --- network communication from the machine --- is only relevant for a small subset of attacks.
|
||||
|
||||
This proposal describe another family of IDSs called physics-based IDS that leverages side-channel information.
|
||||
This proposal describes another family of IDSs called physics-based IDS --- also called side-channel-based IDS --- that leverages side-channel information.
|
||||
Side-channel information is a perfect candidate for intrusion detection as it is, by definition, an involuntary emission from the target.
|
||||
Collecting side-channel information requires no communication with the machine to protect.
|
||||
Moreover, if chosen adequately, side-channel information can provide insight into all activities performed by the machine.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue