Results 1 - 10
of
6,719
Secure Selecticast for collaborative intrusion detection systems
- in: Workshop on Distributed EventBased System
, 2002
"... The problem domain of Collaborative Intrusion Detection Systems (CIDS) introduces distinctive data routing challenges, which we show are solvable through a sufficiently flexible publish-subscribe system. CIDS share intrusion detection data among organizations, usually to predict impending attacks ea ..."
Abstract
-
Cited by 18 (4 self)
- Add to MetaCart
The problem domain of Collaborative Intrusion Detection Systems (CIDS) introduces distinctive data routing challenges, which we show are solvable through a sufficiently flexible publish-subscribe system. CIDS share intrusion detection data among organizations, usually to predict impending attacks
Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS, in:
- Proceedings of ACSAC,
, 2003
"... Abstract In this paper, we present the design and implementation of a Collaborative Intrusion Detection System (CIDS) for ..."
Abstract
-
Cited by 37 (7 self)
- Add to MetaCart
Abstract In this paper, we present the design and implementation of a Collaborative Intrusion Detection System (CIDS) for
more Collaborative Intrusion Detection Systems (CIDSs) to
"... Abstract—Alert correlation analyzes the alerts from one or ..."
Relieving Hot Spots in Collaborative Intrusion Detection Systems during Worm Outbreaks
"... Abstract-The increasing number of stealthy and coordinated attacks on the Internet pose a significant threat to network security. Collaborative intrusion detection systems (CIDSs) have therefore been proposed to address this coordinated defense challenge by correlating patterns of suspicious activi ..."
Abstract
- Add to MetaCart
Abstract-The increasing number of stealthy and coordinated attacks on the Internet pose a significant threat to network security. Collaborative intrusion detection systems (CIDSs) have therefore been proposed to address this coordinated defense challenge by correlating patterns of suspicious
A Peer-to-Peer Collaborative Intrusion Detection System
- International Conference on Networks 2005, Kuala Lumpur
, 2005
"... Abstract — Many types of network intrusions occur in multiple networks simultaneously, for example, scanning, worms, and denial-of-service attacks. Most of the current intrusion detection systems work in isolation to detect these attacks. Past research has shown that collaboration between these netw ..."
Abstract
-
Cited by 20 (1 self)
- Add to MetaCart
Abstract — Many types of network intrusions occur in multiple networks simultaneously, for example, scanning, worms, and denial-of-service attacks. Most of the current intrusion detection systems work in isolation to detect these attacks. Past research has shown that collaboration between
Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System
- In Proc. of ITNG 2011
, 2011
"... Abstract—In this paper, we introduce Collabra, a distributed intrusion detection platform based on Xen hypervisors to maintain the security of the cloud based on virtualized network. While the concept of virtual machine monitor (VMM) signifies implementing an abstraction layer between the underlying ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
. Sophisticated attacks can be launched in the distributed and collaborative style thereby bypassing most current intrusion detection systems. Collabra acts as a filtering layer which is completely integrated with every VMM. It scans through each call by incorporating integrity checking and collaborative
Probe-response attacks on collaborative intrusion detection systems: effectiveness and countermeasures
"... Abstract—Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intrusion Detection Systems (IDSs) cannot cope with the number and sophistication of attacks, collaboration among the defenders is required. Collaborative IDSs (CIDSs) work by exchanging alert tra ..."
Abstract
- Add to MetaCart
Abstract—Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intrusion Detection Systems (IDSs) cannot cope with the number and sophistication of attacks, collaboration among the defenders is required. Collaborative IDSs (CIDSs) work by exchanging alert
SkipMon: A Locality-Aware Collaborative Intrusion Detection System
"... Abstract—Due to the increasing quantity and sophistication of cyber-attacks, Intrusion Detection Systems (IDSs) are nowadays considered mandatory security mechanisms for protecting critical networks. Research on cyber-security is moving from such isolated IDSs towards Collaborative IDSs (CIDSs) in o ..."
Abstract
- Add to MetaCart
Abstract—Due to the increasing quantity and sophistication of cyber-attacks, Intrusion Detection Systems (IDSs) are nowadays considered mandatory security mechanisms for protecting critical networks. Research on cyber-security is moving from such isolated IDSs towards Collaborative IDSs (CIDSs
www.informatik2011.de Framework for Evaluating Collaborative Intrusion Detection Systems
"... Abstract: Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attac ..."
Abstract
- Add to MetaCart
attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation
Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System
"... Abstract. This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the “Distributed Network Security Sensors ” distributed among the nodes of the internal network to monitor traffic. We study the tradeoff between cost and monitoring coverage to determ ..."
Abstract
- Add to MetaCart
Abstract. This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the “Distributed Network Security Sensors ” distributed among the nodes of the internal network to monitor traffic. We study the tradeoff between cost and monitoring coverage
Results 1 - 10
of
6,719