메뉴 건너뛰기




Volumn , Issue , 2007, Pages 80-89

Evaluation of a decentralized architecture for large scale collaborative intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTATIONAL EFFICIENCY; COMPUTER SUPPORTED COOPERATIVE WORK; DECENTRALIZED CONTROL; LARGE SCALE SYSTEMS;

EID: 34748814488     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INM.2007.374772     Document Type: Conference Paper
Times cited : (46)

References (38)
  • 3
    • 0003676885 scopus 로고
    • Fingerprinting by Random Polynomials
    • Technical Report 15-81, Harvard University
    • M. O. Rabin, "Fingerprinting by Random Polynomials," In Technical Report 15-81, Harvard University, 1981.
    • (1981)
    • Rabin, M.O.1
  • 4
    • 21644452488 scopus 로고    scopus 로고
    • Alert Correlation through Triggering Events and Common Resources
    • D. Xu, P. Ning, "Alert Correlation through Triggering Events and Common Resources," In Proceedings of ACSAC '04, 2004.
    • (2004) Proceedings of ACSAC '04
    • Xu, D.1    Ning, P.2
  • 5
    • 0042536226 scopus 로고    scopus 로고
    • Code Red: A Case Study on the Spread and Victims of an Internet Worm
    • D. Moore, C. Shannon, and K. Claffy, "Code Red: A Case Study on the Spread and Victims of an Internet Worm," In ACM SIGCOMM, 2002.
    • (2002) ACM SIGCOMM
    • Moore, D.1    Shannon, C.2    Claffy, K.3
  • 6
    • 0030704545 scopus 로고    scopus 로고
    • Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the WorldWideWeb
    • May
    • D. R. Karger, et. al., "Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the WorldWideWeb," In Proc. 29th Ann. ACM Symp., May 1997, pp.654-663.
    • (1997) Proc. 29th Ann. ACM Symp , pp. 654-663
    • Karger, D.R.1    et., al.2
  • 8
    • 85015426785 scopus 로고    scopus 로고
    • A Peer-to-Peer Collaborative Intrusion Detection System
    • November
    • C. V. Zhou, S. Karunasekera and C. Leckie, "A Peer-to-Peer Collaborative Intrusion Detection System," In Proc. ICON '05, November, 2005.
    • (2005) Proc. ICON '05
    • Zhou, C.V.1    Karunasekera, S.2    Leckie, C.3
  • 9
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous Payload-based Network Intrusion Detection
    • Sept
    • K. Wang, S. Stolfo, "Anomalous Payload-based Network Intrusion Detection," In Proceedings of RAID '04, Sept. 2004.
    • (2004) Proceedings of RAID '04
    • Wang, K.1    Stolfo, S.2
  • 11
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • July
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," In CACM, vol. 13, pp.422-426, July 1970.
    • (1970) CACM , vol.13 , pp. 422-426
    • Bloom, B.H.1
  • 16
    • 34748887685 scopus 로고    scopus 로고
    • A probabilistic approach to detecting network scans
    • Italy, Apr
    • C. Leckie and R. Kotagiri, "A probabilistic approach to detecting network scans," In Proceedings of NOMS '02, Italy, Apr. 2002.
    • (2002) Proceedings of NOMS '02
    • Leckie, C.1    Kotagiri, R.2
  • 17
    • 85137546697 scopus 로고    scopus 로고
    • Global Intrusion Detection in the DOMINO Overlay System
    • V. Yegneswaran, P. Barford and S. Jha, "Global Intrusion Detection in the DOMINO Overlay System," In 11th ANDSSS, 2004.
    • (2004) 11th ANDSSS
    • Yegneswaran, V.1    Barford, P.2    Jha, S.3
  • 18
    • 0006002061 scopus 로고    scopus 로고
    • Lambda: A language to model a database for detection of attacks
    • F. Cuppens and R. Ortalo, "Lambda: A language to model a database for detection of attacks," In Proceedings of RAID 2000.
    • Proceedings of RAID 2000
    • Cuppens, F.1    Ortalo, R.2
  • 19
    • 35048819574 scopus 로고    scopus 로고
    • Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation
    • Jan
    • J. Garcia, F. Autrel, J. Borrell, S. Castillo, F. Cuppens, G. Navarro, "Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation," In LNCS, Volume 3269, Jan 2004, pp. 223-235.
    • (2004) LNCS , vol.3269 , pp. 223-235
    • Garcia, J.1    Autrel, F.2    Borrell, J.3    Castillo, S.4    Cuppens, F.5    Navarro, G.6
  • 21
    • 34748925797 scopus 로고    scopus 로고
    • SQL-Slammer Worm, http://www.cert.org/advisories/CA-2003-04.html.
    • SQL-Slammer Worm1
  • 23
    • 0036079912 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • F. Cuppens, A. Miege, "Alert correlation in a cooperative intrusion detection framework," In Proc. Security and Privacy, 2002.
    • (2002) Proc. Security and Privacy
    • Cuppens, F.1    Miege, A.2
  • 28
    • 0020083498 scopus 로고    scopus 로고
    • The Meaning and Use of the Area Under a Receiver Operating Characteristic (ROC) Curve
    • J. A. Hanley, and B. J. McNeil, "The Meaning and Use of the Area Under a Receiver Operating Characteristic (ROC) Curve," In Radiology 143, 29-36.
    • Radiology , vol.143 , pp. 29-36
    • Hanley, J.A.1    McNeil, B.J.2
  • 29
    • 0018079655 scopus 로고    scopus 로고
    • Basic Principles of ROC Analysis
    • C. E. Metz, "Basic Principles of ROC Analysis," Seminars in Nuclear Medicine, VIII(4), 283-298.
    • Seminars in Nuclear Medicine , vol.8 , Issue.4 , pp. 283-298
    • Metz, C.E.1
  • 31
    • 34748816777 scopus 로고    scopus 로고
    • CERT Coordination Center: CERT Advisory CA-2001-26 Nimda Worm. http://www.cert.org/advisories/CA-2001-26.html.
    • CERT Coordination Center: CERT Advisory CA-2001-26 Nimda Worm. http://www.cert.org/advisories/CA-2001-26.html.
  • 32
    • 34748854245 scopus 로고    scopus 로고
    • An analysis of SQL.Spider-B, Digispid.B.Worm, Spida, MSSQL Worm and SQL Snake
    • An analysis of SQL.Spider-B. (Digispid.B.Worm, Spida, MSSQL Worm and SQL Snake) http://www.sans.org/resources/idfaq/spider.php.
  • 33
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, and L. Adelman, "A method for obtaining digital signatures and public-key cryptosystems," In CACM, 21:120-126, 1978.
    • (1978) CACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adelman, L.3
  • 35
    • 34748832809 scopus 로고    scopus 로고
    • Bamboo, http://bamboo-dht.org/.
    • Bamboo
  • 36
    • 34748857325 scopus 로고    scopus 로고
    • Pastry, http://freepastry.rice.edu/.
    • Pastry1
  • 38
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • V. Paxson, "An analysis of using reflectors for distributed denial-of-service attacks," Computer Communication Review 31(3).
    • Computer Communication Review , vol.31 , Issue.3
    • Paxson, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.