A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Global Security Architecture for Intrusion Detection on Computer Networks
2007
2007 IEEE International Parallel and Distributed Processing Symposium
Detecting all kinds of intrusions efficiently requires a global view of the monitored network. ...
In this article, we present the global architecture of our system, called DSOC as well as several methods used to test its accuracy and performance. ...
Lee, Chung, Kim, Younho, Park and Yoon proposed a distributed intrusion detection system [8] which correlates alerts in real time. ...
doi:10.1109/ipdps.2007.370621
dblp:conf/ipps/GanameBBS07
fatcat:qzx4kk4ufjdqbo6yuewkcwz7vu
A global security architecture for intrusion detection on computer networks
2008
Computers & security
Detecting all kinds of intrusions efficiently requires a global view of the monitored network. ...
In this article, we present the global architecture of our system, called DSOC as well as several methods used to test its accuracy and performance. ...
Lee, Chung, Kim, Younho, Park and Yoon proposed a distributed intrusion detection system [8] which correlates alerts in real time. ...
doi:10.1016/j.cose.2008.03.004
fatcat:mzinrqqba5dzriy53aamzt7vri
Collaborative Security
2015
ACM Computing Surveys
Thus far, collaboration has been used in many domains such as intrusion detection, spam filtering, botnet resistance, and vulnerability detection. ...
Security is oftentimes centrally managed. An alternative trend of using collaboration in order to improve security has gained momentum over the past few years. ...
Yu et al. [2004] propose this collaborative architecture for multiple intrusion detection systems. It can collect alerts generated by IDSs by standardizing the intrusion alerts. ...
doi:10.1145/2785733
fatcat:mu6hd7jk4vgjxhdhkpvjuose4e
A Novel Protocol Design and Collaborative Forensics Mechanism for VoIP Services
2012
Journal of Communications
In TRINETR [17] , Yu et al. proposed a collaborative architecture for a multiple intrusion detection system that works together with knowledge-based detection sensors to detect real-time network intrusion ...
In [5] , Sengar et al. proposed an intrusion detection system based on this protocol-state method. ...
doi:10.4304/jcm.7.2.132-142
fatcat:w64db2ch5jbhdnoh3w54osaaua