Apr. 11, 2005 to Apr. 14, 2005
Mohammad Banikazemi , Thomas J. Watson Research Center, IBM Research, Yorktown Heights, NY
Dan Poff , Thomas J. Watson Research Center, IBM Research, Yorktown Heights, NY
Bulent Abali , Thomas J. Watson Research Center, IBM Research, Yorktown Heights, NY
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSST.2005.33
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected by storage systems. Intrusion detection (ID) techniques can be deployed in various storage systems. In this paper, we study how intrusions can be detected at the block storage level and in SAN environments. We propose novel approaches for storagebased intrusion detection and discuss how features of state-of-the-art block storage systems can be used for intrusion detection and recovery of compromised data. In particular we present two prototype systems. First we present a real time intrusion detection system (IDS) which has been integrated within a storage management and virtualization system. In this system incoming requests for storage blocks are examined for signs of intrusions in real time. We then discuss how intrusion detection schemes can be deployed as an appliance loosely coupled with a SAN storage system. The major advantage of this approach is that it does not require any modification and enhancement to the storage system software. In this approach, we use the space and time efficient point-in-time copy operation provided by SAN storage devices. We also present performance results showing that the impact of ID on the overall storage system performance is negligible. Recovering data in compromised systems is also discussed.
Mohammad Banikazemi, Dan Poff, Bulent Abali, "Storage-Based Intrusion Detection for Storage Area Networks (SANs)", MSST, 2005, Mass Storage Systems and Technologies, IEEE / NASA Goddard Conference on, Mass Storage Systems and Technologies, IEEE / NASA Goddard Conference on 2005, pp. 118-127, doi:10.1109/MSST.2005.33