Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01
DOI: 10.1109/discex.2001.932192
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Intrusion Traceback and Response Architecture (CITRA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(27 citation statements)
references
References 2 publications
0
27
0
Order By: Relevance
“…Similar approach was taken by CITRA [21]. This framework integrates network-based intrusion detection, security management systems and network infrastructure (firewalls, routers) to detect the intrusion, trace it back to the source and coordinate local response actions based on the attack report.…”
Section: Static Mapping Vs Dynamic Mappingmentioning
confidence: 99%
See 2 more Smart Citations
“…Similar approach was taken by CITRA [21]. This framework integrates network-based intrusion detection, security management systems and network infrastructure (firewalls, routers) to detect the intrusion, trace it back to the source and coordinate local response actions based on the attack report.…”
Section: Static Mapping Vs Dynamic Mappingmentioning
confidence: 99%
“…The Cooperative Intrusion Traceback and Response Architecture (CITRA) presented in [21] provides an example of cooperative agent-based system. This architecture utilizes neighborhood structure where the information about detected intrusion is propagated back through the neighborhood to the source of the attack and submitted to the centralized authority.…”
Section: Autonomous Vs Cooperativementioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, if an active router detects an attack attempt it will send an active packet to the other edge active router to block the attacking packets. Unlike some other approaches [10,11,12,13,14], this architecture allows the network to work without relying on a central management server.…”
Section: The Active Router Architecturementioning
confidence: 99%
“…[12] and [13] provide ways to record network traffic information through a serial of routers. We can set filters on key routers, which will then collect interesting information for us.…”
Section: Multiple Routers Tracebackmentioning
confidence: 99%