메뉴 건너뛰기




Volumn , Issue , 2016, Pages

SkipMon: A locality-aware Collaborative Intrusion Detection System

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DATA PRIVACY; DISTRIBUTED COMPUTER SYSTEMS; MERCURY (METAL);

EID: 84969924884     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PCCC.2015.7410282     Document Type: Conference Paper
Times cited : (24)

References (29)
  • 3
    • 84865446336 scopus 로고    scopus 로고
    • Enhancing collaborative intrusion detection methods using a kademlia overlay network
    • Springer
    • Zoltán Czirkos and Gábor Hosszú. Enhancing Collaborative Intrusion Detection Methods Using a Kademlia Overlay Network. In 18th EUNICE/ IFIP WG 6. 2, 6. 6 International Conference, volume 7479, pages 52-63. Springer, 2012.
    • (2012) 18th EUNICE/ IFIP WG 6. 2, 6. 6 International Conference , vol.7479 , pp. 52-63
    • Czirkos, Z.1    Hosszú, G.2
  • 12
    • 70350414487 scopus 로고    scopus 로고
    • Peer-to-peer architecture for collaborative intrusion and malware detection on a large scale
    • Mirco Marchetti, Michele Messori, and Michele Colajanni. Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale. Lecture Notes in Computer Science, 5735:475-490, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5735 , pp. 475-490
    • Marchetti, M.1    Messori, M.2    Colajanni, M.3
  • 13
    • 84947235017 scopus 로고    scopus 로고
    • Kademlia: A peer-to-peer information system based on the XOR metric
    • Springer Berlin Heidelberg
    • Petar Maymounkov and David Mazieres. Kademlia: A peer-to-peer information system based on the XOR metric. In Peer-to-Peer Systems, volume 2429 of LNCS. Springer Berlin Heidelberg, 2002.
    • (2002) Peer-to-Peer Systems Volume 2429 of LNCS
    • Maymounkov, P.1    Mazieres, D.2
  • 15
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • December
    • Vern Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, December 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 17
    • 0025436383 scopus 로고
    • Skip lists: A probabilistic alternative to balanced trees
    • William Pugh. Skip lists: A probabilistic alternative to balanced trees. Communications of the ACM, 33(6):668-676, 1990.
    • (1990) Communications of the ACM , vol.33 , Issue.6 , pp. 668-676
    • Pugh, W.1
  • 18
    • 85090433665 scopus 로고    scopus 로고
    • Snort-lightweight intrusion detection for networks
    • Martin Roesch. Snort-lightweight intrusion detection for networks. In USENIX conference on System administration, pages 229-238, 1999.
    • (1999) USENIX Conference on System Administration , pp. 229-238
    • Roesch, M.1
  • 20
    • 84873369793 scopus 로고    scopus 로고
    • Targeted cyber attacks- A superset of advanced persistent threats
    • Aditya K. Sood and Richard J. Enbody. Targeted Cyber Attacks-A Superset of Advanced Persistent Threats. IEEE Security & Privacy, 11(1):54-61, 2013.
    • (2013) IEEE Security & Privacy , vol.11 , Issue.1 , pp. 54-61
    • Sood, A.K.1    Enbody, R.J.2
  • 21
    • 0034300682 scopus 로고    scopus 로고
    • Intrusion detection using autonomous agents
    • Eugene H Spafford and Diego Zamboni. Intrusion Detection using Autonomous Agents. Computer Networks, 34(4):547-570, 2000.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 547-570
    • Spafford, E.H.1    Zamboni, D.2
  • 27
    • 0141464248 scopus 로고    scopus 로고
    • HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
    • IEEE
    • Zheng Zhang, Jun Li, C N Manikopoulos, Jay Jorgenson, and Jose Ucles. HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification. In IEEE Workshop on Information Assurance and Security, pages 85-90. IEEE, 2001.
    • (2001) IEEE Workshop on Information Assurance and Security , pp. 85-90
    • Zhang, Z.1    Li, J.2    Manikopoulos, C.N.3    Jorgenson, J.4    Ucles, J.5
  • 29
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • February
    • Chenfeng Vincent Zhou, Christopher Leckie, and Shanika Karunasekera. A Survey of Coordinated Attacks and Collaborative Intrusion Detection. Computers & Security, 29(1):124-140, February 2010.
    • (2010) Computers & Security , vol.29 , Issue.1 , pp. 124-140
    • Vincent Zhou, C.1    Leckie, C.2    Karunasekera, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.