Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intrusion Detection Systems (IDSs) cannot cope with the number and sophistication of attacks, collaboration among the defenders is required. Collaborative IDSs (CIDSs) work by exchanging alert traffic to construct a holistic view of the monitored network. However, an adversary can utilize probe-response attacks to successfully detect CIDS's monitoring sensors. We discuss the practicability of such attacks, suggest improvements, and also propose novel techniques to reduce the effects of such attacks. Moreover, we present preliminary results in the applicability of the attacks and hints on performing such attacks in a well known CIDS
Abstract:- When an attacker tries to penetrate the network, there are many defensive systems, includ...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Abstract:- Distributed network intrusion detection systems which incorporate tens, hundreds, even th...
Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intru...
Cyber-attacks are steadily increasing in both their size and sophistication. To cope with this, Int...
With the increase in the sophistication of cyber-attacks, collaborative defensive approaches such as...
The dependency of our society on networked computers has become frightening: In the economy, all-dig...
Intrusions are becoming more complicated with the recent development of adversarial techniques. To b...
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our ...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
Intrusion Detection Systems (IDSs) are one of the key components for securing computing infrastructu...
Most intrusion detection systems (IDSs) available today are using a single audit source for detectio...
Abstract:- When an attacker tries to penetrate the network, there are many defensive systems, includ...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Abstract:- Distributed network intrusion detection systems which incorporate tens, hundreds, even th...
Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intru...
Cyber-attacks are steadily increasing in both their size and sophistication. To cope with this, Int...
With the increase in the sophistication of cyber-attacks, collaborative defensive approaches such as...
The dependency of our society on networked computers has become frightening: In the economy, all-dig...
Intrusions are becoming more complicated with the recent development of adversarial techniques. To b...
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our ...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
Intrusion Detection Systems (IDSs) are one of the key components for securing computing infrastructu...
Most intrusion detection systems (IDSs) available today are using a single audit source for detectio...
Abstract:- When an attacker tries to penetrate the network, there are many defensive systems, includ...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Abstract:- Distributed network intrusion detection systems which incorporate tens, hundreds, even th...