Most intrusion detection systems (IDSs) available today are using a single audit source for detection,even though attacks have distinct manifestations in different parts of the system. Previously,we have explored the benefits of combining several sensors monitoring different audit sources toimprove the detection of attacks. In this paper we go one step further and investigate possible synergeticeffects by actively sharing information between distinct intrusion detection sensors takingevents from isolated audit sources. We present four scenarios where we show how the function ofone IDS, measured as false alarm rate, performance in terms of used resources, or attack response,can be improved by having access to information collected and analyz...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our ...
Efforts have been made over the last decades in order to design and perfect Intrusion Detection Sys...
Most intrusion detection systems available today are using a single audit source for detection, even...
Abstract. Over the past decade Intrusion Detection Systems (IDS) have been steadily improving their ...
Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intru...
False alarms and timely identification of new attacks are two of the biggest challenges to the effec...
Various intrusion detection systems (IDSs) reported in the literature have shown distinct preferen...
Abstract:- Distributed network intrusion detection systems which incorporate tens, hundreds, even th...
Fusion of multiple intrusion detection systems results in a more reliable and accurate detection for...
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of...
Recent studies about Intrusion Detection Systems (IDS) performance reveal that the value of an IDS a...
The motivation behind the fusion of Intrusion Detection Systems was the realization that with the in...
Cyber-attacks are steadily increasing in both their size and sophistication. To cope with this, Int...
A traditional Network Intrusion Detection System (NIDS) isbased on a centralized architecture that d...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our ...
Efforts have been made over the last decades in order to design and perfect Intrusion Detection Sys...
Most intrusion detection systems available today are using a single audit source for detection, even...
Abstract. Over the past decade Intrusion Detection Systems (IDS) have been steadily improving their ...
Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intru...
False alarms and timely identification of new attacks are two of the biggest challenges to the effec...
Various intrusion detection systems (IDSs) reported in the literature have shown distinct preferen...
Abstract:- Distributed network intrusion detection systems which incorporate tens, hundreds, even th...
Fusion of multiple intrusion detection systems results in a more reliable and accurate detection for...
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of...
Recent studies about Intrusion Detection Systems (IDS) performance reveal that the value of an IDS a...
The motivation behind the fusion of Intrusion Detection Systems was the realization that with the in...
Cyber-attacks are steadily increasing in both their size and sophistication. To cope with this, Int...
A traditional Network Intrusion Detection System (NIDS) isbased on a centralized architecture that d...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our ...
Efforts have been made over the last decades in order to design and perfect Intrusion Detection Sys...