2018
DOI: 10.3103/s0146411618080230
|View full text |Cite
|
Sign up to set email alerts
|

A Distributed Intrusion Detection System with Protection from an Internal Intruder

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Further classification of the IDS is based on how these components are connected and coordinated in the system. Thus, there are monolithic, distributed, hierarchical, and agent-based systems [43,44]. The distributed IDS assumes that each node of the information system has its own IDS which are able to communicate with each other, and there is one dedicated IDS server that is responsible for the final data analysis and decision-making.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…Further classification of the IDS is based on how these components are connected and coordinated in the system. Thus, there are monolithic, distributed, hierarchical, and agent-based systems [43,44]. The distributed IDS assumes that each node of the information system has its own IDS which are able to communicate with each other, and there is one dedicated IDS server that is responsible for the final data analysis and decision-making.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…), Application -applications running on devices. The implementation of scanners from each of the sources allowed us to create a solution that collects the following user behavior features [44][45][46].…”
Section: Model Structurementioning
confidence: 99%
“…Big data classical techniques are traditionally referred to as the field of endto-end or request-response solutions. While intrusion detection systems require online analysis, they use methods of data-flow computing of incoming data [56].…”
Section: Distributed Intrusion Detections Systems In Big Datamentioning
confidence: 99%