-
3
-
-
84865446336
-
Enhancing collaborative intrusion detection methods using a kademlia overlay network
-
Springer
-
Zoltán Czirkos and Gábor Hosszú. Enhancing Collaborative Intrusion Detection Methods Using a Kademlia Overlay Network. In 18th EUNICE/ IFIP WG 6. 2, 6. 6 International Conference, volume 7479, pages 52-63. Springer, 2012.
-
(2012)
18th EUNICE/ IFIP WG 6. 2, 6. 6 International Conference
, vol.7479
, pp. 52-63
-
-
Czirkos, Z.1
Hosszú, G.2
-
6
-
-
85018056423
-
Skipnet: A scalable overlay network with practical locality properties
-
Seattle, WA, USENIX Association
-
Nicholas JA Harvey, Michael B. Jones, Stefan Saroiu, Marvin Theimer, and Alec Wolman. Skipnet: A scalable overlay network with practical locality properties. In USENIX Symposium on Internet Technologies and Systems (USITS), volume 4, pages 1-14, Seattle, WA, 2003. USENIX Association.
-
(2003)
USENIX Symposium on Internet Technologies and Systems (USITS)
, vol.4
, pp. 1-14
-
-
Harvey, N.J.A.1
Jones, M.B.2
Saroiu, S.3
Theimer, M.4
Wolman, A.5
-
8
-
-
0037624711
-
Probabilistic reliable dissemination in large-scale systems
-
Anne Marie Kermarrec, Laurent Massoulié, and Ayalvadi J. Ganesh. Probabilistic reliable dissemination in large-scale systems. IEEE Trans-actions on Parallel and Distributed Systems, 14(3):248-258, 2003.
-
(2003)
IEEE Trans-actions on Parallel and Distributed Systems
, vol.14
, Issue.3
, pp. 248-258
-
-
Marie Kermarrec, A.1
Massoulié, L.2
Ganesh, A.J.3
-
10
-
-
33745469273
-
Towards collaborative security and p2p intrusion detection
-
IEEE
-
Michael E. Locasto, Janak J. Parekh, Angelos D. Keromytis, and Salvatore J. Stolfo. Towards Collaborative Security and P2P Intrusion Detection. In IEEE Workshop on Information Assurance and Security, pages 333-339. IEEE, 2005.
-
(2005)
IEEE Workshop on Information Assurance and Security
, pp. 333-339
-
-
Locasto, M.E.1
Parekh, J.J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
11
-
-
77951157906
-
A survey and comparison of peer-topeer overlay network schemes
-
EK Lua, J Crowcroft, and M Pias. A survey and comparison of peer-topeer overlay network schemes. Communications Surveys & Tutorials, IEEE, 7(2):72-93, 2005.
-
(2005)
Communications Surveys & Tutorials, IEEE
, vol.7
, Issue.2
, pp. 72-93
-
-
Lua, E.K.1
Crowcroft, J.2
Pias, M.3
-
12
-
-
70350414487
-
Peer-to-peer architecture for collaborative intrusion and malware detection on a large scale
-
Mirco Marchetti, Michele Messori, and Michele Colajanni. Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale. Lecture Notes in Computer Science, 5735:475-490, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5735
, pp. 475-490
-
-
Marchetti, M.1
Messori, M.2
Colajanni, M.3
-
13
-
-
84947235017
-
Kademlia: A peer-to-peer information system based on the XOR metric
-
Springer Berlin Heidelberg
-
Petar Maymounkov and David Mazieres. Kademlia: A peer-to-peer information system based on the XOR metric. In Peer-to-Peer Systems, volume 2429 of LNCS. Springer Berlin Heidelberg, 2002.
-
(2002)
Peer-to-Peer Systems Volume 2429 of LNCS
-
-
Maymounkov, P.1
Mazieres, D.2
-
15
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
December
-
Vern Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, December 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
17
-
-
0025436383
-
Skip lists: A probabilistic alternative to balanced trees
-
William Pugh. Skip lists: A probabilistic alternative to balanced trees. Communications of the ACM, 33(6):668-676, 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.6
, pp. 668-676
-
-
Pugh, W.1
-
18
-
-
85090433665
-
Snort-lightweight intrusion detection for networks
-
Martin Roesch. Snort-lightweight intrusion detection for networks. In USENIX conference on System administration, pages 229-238, 1999.
-
(1999)
USENIX Conference on System Administration
, pp. 229-238
-
-
Roesch, M.1
-
19
-
-
0002473030
-
DIDS (distributed intrusion detection system)-motivation, architecture, and an early prototype
-
Steven Snapp, James Brentano, Gihan Dias, Terrance Goan, Todd Heberlein, Che-Lin Ho, Karl Levitt, Biswanath Mukherjee, Stephen Smaha, Tim Grance, Daniel Teal, and Doug Mansur. DIDS (Distributed intrusion detection system)-Motivation, Architecture, and an early Prototype. In Fourteenth National Computer Security Conference, pages 167-176, 1991.
-
(1991)
Fourteenth National Computer Security Conference
, pp. 167-176
-
-
Snapp, S.1
Brentano, J.2
Dias, G.3
Goan, T.4
Heberlein, T.5
Ho, C.6
Levitt, K.7
Mukherjee, B.8
Smaha, S.9
Grance, T.10
Teal, D.11
Mansur, D.12
-
20
-
-
84873369793
-
Targeted cyber attacks- A superset of advanced persistent threats
-
Aditya K. Sood and Richard J. Enbody. Targeted Cyber Attacks-A Superset of Advanced Persistent Threats. IEEE Security & Privacy, 11(1):54-61, 2013.
-
(2013)
IEEE Security & Privacy
, vol.11
, Issue.1
, pp. 54-61
-
-
Sood, A.K.1
Enbody, R.J.2
-
21
-
-
0034300682
-
Intrusion detection using autonomous agents
-
Eugene H Spafford and Diego Zamboni. Intrusion Detection using Autonomous Agents. Computer Networks, 34(4):547-570, 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
22
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet
-
ACM
-
Ion Stoica, Robert Morris, David Karger, M Frans Kaashoek, and Hari Balakrishnan Ý. Chord: A Scalable Peer-to-peer Lookup Service for Internet. In Applications, technologies, architectures, and protocols for computer communications, pages 149-160. ACM, 2001.
-
(2001)
Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Frans Kaashoek, M.4
Hari Balakrishnan, Ý.5
-
23
-
-
85027943921
-
Theory and practice of bloom filters for distributed systems
-
Sasu Tarkoma, Christian Esteve Rothenberg, and Eemil Lagerspetz. Theory and Practice of Bloom Filters for Distributed Systems. IEEE Communications Surveys & Tutorials, 14(1):131-155, 2012.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.14
, Issue.1
, pp. 131-155
-
-
Tarkoma, S.1
Esteve Rothenberg, C.2
Lagerspetz, E.3
-
26
-
-
84930153452
-
Taxonomy and survey of collaborative intrusion detection
-
Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, and Mathias Fischer. Taxonomy and Survey of Collaborative Intrusion Detection. ACM Computing Surveys, 47(4):33, 2015.
-
(2015)
ACM Computing Surveys
, vol.47
, Issue.4
, pp. 33
-
-
Vasilomanolakis, E.1
Karuppayah, S.2
Mühlhäuser, M.3
Fischer, M.4
-
27
-
-
0141464248
-
HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
-
IEEE
-
Zheng Zhang, Jun Li, C N Manikopoulos, Jay Jorgenson, and Jose Ucles. HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification. In IEEE Workshop on Information Assurance and Security, pages 85-90. IEEE, 2001.
-
(2001)
IEEE Workshop on Information Assurance and Security
, pp. 85-90
-
-
Zhang, Z.1
Li, J.2
Manikopoulos, C.N.3
Jorgenson, J.4
Ucles, J.5
-
29
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
February
-
Chenfeng Vincent Zhou, Christopher Leckie, and Shanika Karunasekera. A Survey of Coordinated Attacks and Collaborative Intrusion Detection. Computers & Security, 29(1):124-140, February 2010.
-
(2010)
Computers & Security
, vol.29
, Issue.1
, pp. 124-140
-
-
Vincent Zhou, C.1
Leckie, C.2
Karunasekera, S.3
|