메뉴 건너뛰기




Volumn 7479 LNCS, Issue , 2012, Pages 52-63

Enhancing collaborative intrusion detection methods using a Kademlia overlay network

Author keywords

attack aggregation; attack correlation; collaborative intrusion detection; intrusion detection system; peer to peer

Indexed keywords

COMPUTATIONAL CAPACITY; COMPUTATIONAL LOADS; DATA STORAGE; DETECTION PROBES; DISTRIBUTED HASH TABLE; DYNAMIC PROPERTY; INTRUSION DETECTION METHOD; INTRUSION DETECTION SYSTEMS; INTRUSION EVENTS; KADEMLIA; OVERLAY NETWORK TOPOLOGY; PEER TO PEER;

EID: 84865446336     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32808-4_6     Document Type: Conference Paper
Times cited : (5)

References (21)
  • 3
    • 84944201343 scopus 로고    scopus 로고
    • LAMBDA: A Language to Model a Database for Detection of Attacks
    • Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. Springer, Heidelberg
    • Cuppens, F., Ortalo, R.: LAMBDA: A Language to Model a Database for Detection of Attacks. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 197-216. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1907 , pp. 197-216
    • Cuppens, F.1    Ortalo, R.2
  • 4
    • 84865502282 scopus 로고    scopus 로고
    • Peer-to-peer Based Intrusion Detection
    • Czirkos, Z., Hosszú, G.: Peer-to-peer Based Intrusion Detection. Infocommunications Journal LXIV(I), 3-10 (2009)
    • (2009) Infocommunications Journal , vol.64 , Issue.1 , pp. 3-10
    • Czirkos, Z.1    Hosszú, G.2
  • 6
    • 84947561772 scopus 로고    scopus 로고
    • Aggregation and Correlation of Intrusion-Detection Alerts
    • Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. Springer, Heidelberg
    • Debar, H., Wespi, A.: Aggregation and Correlation of Intrusion-Detection Alerts. In: Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. LNCS, vol. 2212, pp. 85-103. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2212 , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 11
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • Kemmerer, R., Vigna, G.: Intrusion detection: a brief history and overview. Computer 35(4), 27-30 (2002)
    • (2002) Computer , vol.35 , Issue.4 , pp. 27-30
    • Kemmerer, R.1    Vigna, G.2
  • 12
    • 33646024301 scopus 로고    scopus 로고
    • A Statistical Theory of Chord under Churn
    • van Renesse, R. (ed.) IPTPS 2005. Springer, Heidelberg
    • Krishnamurthy, S., El-Ansary, S., Aurell, E., Haridi, S.: A Statistical Theory of Chord Under Churn. In: van Renesse, R. (ed.) IPTPS 2005. LNCS, vol. 3640, pp. 93-103. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3640 , pp. 93-103
    • Krishnamurthy, S.1    El-Ansary, S.2    Aurell, E.3    Haridi, S.4
  • 18
    • 34547936756 scopus 로고    scopus 로고
    • A PRoactive Malware Identification System based on the Computer Hygiene Principles
    • Vlachos, V., Spinellis, D.: A PRoactive Malware Identification System based on the Computer Hygiene Principles. Information Management and Computer Security 15(4), 295-312 (2007)
    • (2007) Information Management and Computer Security , vol.15 , Issue.4 , pp. 295-312
    • Vlachos, V.1    Spinellis, D.2
  • 21
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • Zhou, C., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Computers & Security 29(1), 124-140 (2010)
    • (2010) Computers & Security , vol.29 , Issue.1 , pp. 124-140
    • Zhou, C.1    Leckie, C.2    Karunasekera, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.