• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,719
Next 10 →

Secure Selecticast for collaborative intrusion detection systems

by Philip Gross, Janak Parekh, Gail Kaiser - in: Workshop on Distributed EventBased System , 2002
"... The problem domain of Collaborative Intrusion Detection Systems (CIDS) introduces distinctive data routing challenges, which we show are solvable through a sufficiently flexible publish-subscribe system. CIDS share intrusion detection data among organizations, usually to predict impending attacks ea ..."
Abstract - Cited by 18 (4 self) - Add to MetaCart
The problem domain of Collaborative Intrusion Detection Systems (CIDS) introduces distinctive data routing challenges, which we show are solvable through a sufficiently flexible publish-subscribe system. CIDS share intrusion detection data among organizations, usually to predict impending attacks

Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS, in:

by Yu-Sung Wu , Bingrui Foo , Yongguo Mei , Saurabh Bagchi , Yu-Sung Wu , Bingrui Foo , Yongguo Mei , Saurabh Bagchi - Proceedings of ACSAC, , 2003
"... Abstract In this paper, we present the design and implementation of a Collaborative Intrusion Detection System (CIDS) for ..."
Abstract - Cited by 37 (7 self) - Add to MetaCart
Abstract In this paper, we present the design and implementation of a Collaborative Intrusion Detection System (CIDS) for

more Collaborative Intrusion Detection Systems (CIDSs) to

by Huwaida Tagelsir, Ibrahim Elshoush
"... Abstract—Alert correlation analyzes the alerts from one or ..."
Abstract - Add to MetaCart
Abstract—Alert correlation analyzes the alerts from one or

Relieving Hot Spots in Collaborative Intrusion Detection Systems during Worm Outbreaks

by Vincent Chenfeng , Shanika Zhou , Christopher Karunasekera , Leckie
"... Abstract-The increasing number of stealthy and coordinated attacks on the Internet pose a significant threat to network security. Collaborative intrusion detection systems (CIDSs) have therefore been proposed to address this coordinated defense challenge by correlating patterns of suspicious activi ..."
Abstract - Add to MetaCart
Abstract-The increasing number of stealthy and coordinated attacks on the Internet pose a significant threat to network security. Collaborative intrusion detection systems (CIDSs) have therefore been proposed to address this coordinated defense challenge by correlating patterns of suspicious

A Peer-to-Peer Collaborative Intrusion Detection System

by Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie - International Conference on Networks 2005, Kuala Lumpur , 2005
"... Abstract — Many types of network intrusions occur in multiple networks simultaneously, for example, scanning, worms, and denial-of-service attacks. Most of the current intrusion detection systems work in isolation to detect these attacks. Past research has shown that collaboration between these netw ..."
Abstract - Cited by 20 (1 self) - Add to MetaCart
Abstract — Many types of network intrusions occur in multiple networks simultaneously, for example, scanning, worms, and denial-of-service attacks. Most of the current intrusion detection systems work in isolation to detect these attacks. Past research has shown that collaboration between

Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System

by Saketh Bharadwaja, Weiqing Sun, Mohammed Niamat, Fangyang Shen - In Proc. of ITNG 2011 , 2011
"... Abstract—In this paper, we introduce Collabra, a distributed intrusion detection platform based on Xen hypervisors to maintain the security of the cloud based on virtualized network. While the concept of virtual machine monitor (VMM) signifies implementing an abstraction layer between the underlying ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
. Sophisticated attacks can be launched in the distributed and collaborative style thereby bypassing most current intrusion detection systems. Collabra acts as a filtering layer which is completely integrated with every VMM. It scans through each call by incorporating integrity checking and collaborative

Probe-response attacks on collaborative intrusion detection systems: effectiveness and countermeasures

by Emmanouil Vasilomanolakisa, Michael Stahnb, Carlos Garcia Corderob
"... Abstract—Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intrusion Detection Systems (IDSs) cannot cope with the number and sophistication of attacks, collaboration among the defenders is required. Collaborative IDSs (CIDSs) work by exchanging alert tra ..."
Abstract - Add to MetaCart
Abstract—Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intrusion Detection Systems (IDSs) cannot cope with the number and sophistication of attacks, collaboration among the defenders is required. Collaborative IDSs (CIDSs) work by exchanging alert

SkipMon: A Locality-Aware Collaborative Intrusion Detection System

by Emmanouil Vasilomanolakis, Carlos Garcia Cordero, Mathias Fischer, Technische Universität Darmstadt
"... Abstract—Due to the increasing quantity and sophistication of cyber-attacks, Intrusion Detection Systems (IDSs) are nowadays considered mandatory security mechanisms for protecting critical networks. Research on cyber-security is moving from such isolated IDSs towards Collaborative IDSs (CIDSs) in o ..."
Abstract - Add to MetaCart
Abstract—Due to the increasing quantity and sophistication of cyber-attacks, Intrusion Detection Systems (IDSs) are nowadays considered mandatory security mechanisms for protecting critical networks. Research on cyber-security is moving from such isolated IDSs towards Collaborative IDSs (CIDSs

www.informatik2011.de Framework for Evaluating Collaborative Intrusion Detection Systems

by Dennis Grunewald, Joel Chinnow, Rainer Bye, Ahmet Camtepe, Sahin Albayrak, Dai-labor Tu Berlin
"... Abstract: Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attac ..."
Abstract - Add to MetaCart
attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation

Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System

by Chengchen Hu, Zhen Liu, Zhen Chen, Bin Liu
"... Abstract. This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the “Distributed Network Security Sensors ” distributed among the nodes of the internal network to monitor traffic. We study the tradeoff between cost and monitoring coverage to determ ..."
Abstract - Add to MetaCart
Abstract. This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the “Distributed Network Security Sensors ” distributed among the nodes of the internal network to monitor traffic. We study the tradeoff between cost and monitoring coverage
Next 10 →
Results 1 - 10 of 6,719
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University