Research on Distributed Intrusion Detection System Model
نویسندگان
چکیده
منابع مشابه
Distributed Cloud Intrusion Detection Model
Intrusion prospects in cloud paradigm are many and with high gains, may it be a bad user or a competitor of cloud client. Distributed model makes it vulnerable and prone to sophisticated distributed intrusion attacks like Distributed Denial of Service (DDOS) and Cross Site Scripting (XSS). Confronting new implementation situations, traditional IDSs are not well suited for cloud environment. To ...
متن کاملA Distributed Intrusion Detection Model for the Domain Name System
We have investigated the problem of detecting DoS-like DNS anomalies in DNS system. In this paper, we propose a distributed Two-phase DNS anomaly detection model for solving the problem. Three sets of algorithms corresponding to different configurations are proposed, including one sequential algorithm and two distributed algorithms, each with an increasing level of parallelism. The complexity o...
متن کاملDistributed Approach of Intrusion Detection System: Survey
Intrusion Detection Systems (IDS) are now becoming one of burning issue for any organization’s network. Intruders always search for vulnerabilities or flaws in target system and attack using different techniques. An intrusion detection system (IDS) is needed to detect and respond effectively whenever the confidentiality, integrity, and availability of computer resources are under attack. Today,...
متن کاملAgent Based Distributed Intrusion Detection System (ABDIDS)
This paper introduce (ABDIDS), a simple pattern attack ontology that allows agent based intrusion detection system to detect network traffic anomalies at a higher level more than most current intrusion detection systems do. The cooperative agent architecture has been presented. It has been shown how some attributes in network communication can be used to detect attacks. Finally, the benefits of...
متن کاملDistributed Intrusion Detection System Using Mobile Agent
The goal of Distributed Intrusion Detection System is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). There is a difficulty to find intrusion in an distributed network segment from inside as w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Energy Procedia
سال: 2011
ISSN: 1876-6102
DOI: 10.1016/j.egypro.2011.11.208