Abstract. Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such challenges. Anomaly-based systems, however, often show high false negative rates. One reason for this is that detection systems work as single instances that base their decisions on local knowledge only. In this paper we propose a collaboration of neighboring detection systems that enables receiving systems to search specifically for that attack which might have been missed by using local knowledge only. Once such attack information is received a decision process has to determine if a search for this attack should be started. The design of our system is...
Cyber security has become a major challenge when detecting and preventing attacks on any self-organi...
Abstract. Today, the Internet is used by companies frequently since it simplifies daily work, speeds...
Intrusion detection systems are used for monitoring the network data, analyze them and find the intr...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
In this paper we analyze the coordinated port scan attack where a single adversary coordinates a Gro...
Abstract. Today’s communication networks are threatened by an increasing number intrusion attempts, ...
Daily access to Internet, increase in number of users, and newly discovered violations of policies, ...
We present a cooperative intrusion detection approach inspired by biological immune system principle...
Abstract—We present a cooperative intrusion detection ap-proach inspired by biological immune system...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
Due to the growing need of security, even in home networks, and the interest for the Internet of Thi...
This paper addresses the problem of collaborative analy-sis in a distributed setting via a network s...
We present a method for detecting large-scale worm attacks using only end-host detectors. These dete...
Abstract. The IT infrastructure of today needs to be ready to defend against massive cyber-attacks w...
We present a prototype of an Intrusion Warning System for combining event message flows of multiple ...
Cyber security has become a major challenge when detecting and preventing attacks on any self-organi...
Abstract. Today, the Internet is used by companies frequently since it simplifies daily work, speeds...
Intrusion detection systems are used for monitoring the network data, analyze them and find the intr...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
In this paper we analyze the coordinated port scan attack where a single adversary coordinates a Gro...
Abstract. Today’s communication networks are threatened by an increasing number intrusion attempts, ...
Daily access to Internet, increase in number of users, and newly discovered violations of policies, ...
We present a cooperative intrusion detection approach inspired by biological immune system principle...
Abstract—We present a cooperative intrusion detection ap-proach inspired by biological immune system...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
Due to the growing need of security, even in home networks, and the interest for the Internet of Thi...
This paper addresses the problem of collaborative analy-sis in a distributed setting via a network s...
We present a method for detecting large-scale worm attacks using only end-host detectors. These dete...
Abstract. The IT infrastructure of today needs to be ready to defend against massive cyber-attacks w...
We present a prototype of an Intrusion Warning System for combining event message flows of multiple ...
Cyber security has become a major challenge when detecting and preventing attacks on any self-organi...
Abstract. Today, the Internet is used by companies frequently since it simplifies daily work, speeds...
Intrusion detection systems are used for monitoring the network data, analyze them and find the intr...