COMPCON Spring '91 Digest of Papers
DOI: 10.1109/cmpcon.1991.128802
|View full text |Cite
|
Sign up to set email alerts
|

A system for distributed intrusion detection

Abstract: Thisis a preprinloi:a paperintendedfor publicationin a journalor proceedings. Since changesmay be madebefore publication,this preprint is madeavailablewith the understandin 8 thai it will not becited or reproducedwithout the permissionof the author.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0
2

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(36 citation statements)
references
References 6 publications
0
31
0
2
Order By: Relevance
“…These problems make the area of IDS an attractive and open research field. In recent years, researchers have investigated a variety of different computational tools to improve IDS performance and overcome some of its limitations, such as Soft Computing (SC) techniques [2], [3], [4], distributed systems [5], [6], [7], and autonomous agents (AA) [8], [9]. Still, a lot more needs to be done to deal with new technologies and tools developed by intruders to break the systems.…”
Section: C) Availabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…These problems make the area of IDS an attractive and open research field. In recent years, researchers have investigated a variety of different computational tools to improve IDS performance and overcome some of its limitations, such as Soft Computing (SC) techniques [2], [3], [4], distributed systems [5], [6], [7], and autonomous agents (AA) [8], [9]. Still, a lot more needs to be done to deal with new technologies and tools developed by intruders to break the systems.…”
Section: C) Availabilitymentioning
confidence: 99%
“…Early systems included dIDS [5], NADIR (Network Anomaly Detector and Intrusion Reporter) [14], CSM (Cooperative Security Managers) [19], EMERALD (Event Monitoring Enabling Response to Anomalous Live Disturbances) [20], AAFID (Autonomous Agents for Intrusion Detection) [8], CIDF (Common Intrusion Detection Framework) [21] and MAIDS (Mobile Agent Intrusion Detection System) [22]. The rest of this section briefly introduces some of these projects.…”
Section: Distributed Idsmentioning
confidence: 99%
“…In centralised systems, such as DIDS [22], DShield [23] and NSTAT [24], each sensor shares alerts with a central correlation unit. Hierarchical approaches, e.g., GrIDS [25], EMERALD [26] and DSOC [27], attempt to address the scalability issues of centralised approaches by organising detection units into a tree-like topology.…”
Section: Related Workmentioning
confidence: 99%
“…Distributed Intrusion Detection System (DIDS) was developed by University of California, Davis (Snapp et al, 1991). This system focuses on extending the intrusion detection from single segment of network to arbitrary large networks.…”
Section: Distributed Intrusion Detection Systemsmentioning
confidence: 99%