With the increasing requirements of fast response and privacy protection, how to detect network intrusions in a distributed architecture becomes a hot research area in the development of modern information security systems. However, it is a challenge to build such a system, given the difficulties brought by the mixed-attribute property of network connection data and the constraints on network communication. In this paper, we present a framework for distributed detection of network intrusions based on a parametric model. The parametric model can explicitly reflect the distributions of different intrusion types and handle the mixed-attribute data naturally. Based on the model, we can generate an accurate global intrusion detector with a very ...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
The evolving Internet and other network technologies have dramatically increased the amount of secur...
Distributed intrustion detection systems detect attacks on computer systems by analyzing data aggreg...
Abstract Evidence of attacks against a network and its resources is often scattered over several hos...
Network intrusion detection systems are widely used in present-day public and private networks to su...
The proliferation of wideband connections while opening the market to a wealth of new web based appl...
Early detection of traffic anomalies in networks increases the probability of effective intervention...
This paper presents a new framework for distributed intrusion detection based on taint marking. Our ...
Part 1: Intrusion DetectionInternational audienceAlthough security issues are now addressed during t...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
Intrusion Detection Systems (IDS) have been developed to solve the problem of detecting the attacks ...
As distributed computations become more and more common in highly distributed environments like the ...
While a firewall at the perimeter of a local network provides the first line of defense against atta...
Intrusion detection systems are used for monitoring the network data, analyze them and find the intr...
This paper proposes anatomy and main functionalities of a distributed framework for supporting adapt...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
The evolving Internet and other network technologies have dramatically increased the amount of secur...
Distributed intrustion detection systems detect attacks on computer systems by analyzing data aggreg...
Abstract Evidence of attacks against a network and its resources is often scattered over several hos...
Network intrusion detection systems are widely used in present-day public and private networks to su...
The proliferation of wideband connections while opening the market to a wealth of new web based appl...
Early detection of traffic anomalies in networks increases the probability of effective intervention...
This paper presents a new framework for distributed intrusion detection based on taint marking. Our ...
Part 1: Intrusion DetectionInternational audienceAlthough security issues are now addressed during t...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
Intrusion Detection Systems (IDS) have been developed to solve the problem of detecting the attacks ...
As distributed computations become more and more common in highly distributed environments like the ...
While a firewall at the perimeter of a local network provides the first line of defense against atta...
Intrusion detection systems are used for monitoring the network data, analyze them and find the intr...
This paper proposes anatomy and main functionalities of a distributed framework for supporting adapt...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
The evolving Internet and other network technologies have dramatically increased the amount of secur...
Distributed intrustion detection systems detect attacks on computer systems by analyzing data aggreg...