Yegneswaran et al., 2003 - Google Patents
Global intrusion detection in the domino overlay systemYegneswaran et al., 2003
View PDF- Document ID
 - 13045724991943889365
 - Author
 - Yegneswaran V
 - Barford P
 - Jha S
 - Publication year
 
External Links
Snippet
Sharing data between widely distributed intrusion detection systems offers the possibility of  significant improvements in speed and accuracy over systems operating in isolation. In this  paper, we describe and evaluate DOMINO (Distributed Overlay for Monitoring InterNet … 
    - 238000001514 detection method 0 title abstract description 39
 
Classifications
- 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1425—Traffic logging, e.g. anomaly detection
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1416—Event detection, e.g. attack signature detection
 
 - 
        
- G—PHYSICS
 - G08—SIGNALLING
 - G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
 - G08B13/00—Burglar, theft or intruder alarms
 - G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
 - G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
 - G08B13/194—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
 - G08B13/196—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
 - G08B13/19654—Details concerning communication with a camera
 - G08B13/19656—Network used to communicate with a camera, e.g. WAN, LAN, Internet
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L12/00—Data switching networks
 - H04L12/02—Details
 - H04L12/26—Monitoring arrangements; Testing arrangements
 - H04L12/2602—Monitoring arrangements
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L43/00—Arrangements for monitoring or testing packet switching networks
 - H04L43/10—Arrangements for monitoring or testing packet switching networks using active monitoring, e.g. heartbeat protocols, polling, ping, trace-route
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F15/00—Digital computers in general; Data processing equipment in general
 - G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
 - G06F15/163—Interprocessor communication
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
 - H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L12/00—Data switching networks
 - H04L12/54—Store-and-forward switching systems
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Yegneswaran et al. | Global intrusion detection in the domino overlay system | |
| Vasilomanolakis et al. | Taxonomy and survey of collaborative intrusion detection | |
| Zhou et al. | A survey of coordinated attacks and collaborative intrusion detection | |
| Chen et al. | Collaborative detection of DDoS attacks over multiple network domains | |
| Bailey et al. | The internet motion sensor-a distributed blackhole monitoring system. | |
| Nagaraja et al. | {BotGrep}: Finding {p2p} bots with structured graph analysis | |
| Yao et al. | Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter | |
| Hao et al. | Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. | |
| Kandula et al. | What's going on? Learning communication rules in edge networks | |
| Hu et al. | Accurate real-time identification of IP prefix hijacking | |
| Gupta et al. | Defending against distributed denial of service attacks: issues and challenges | |
| Feamster | Outsourcing home network security | |
| Katti et al. | Collaborating against common enemies | |
| Bhatia et al. | Parametric differences between a real-world distributed denial-of-service attack and a flash event | |
| Li et al. | Towards scalable and robust distributed intrusion alert fusion with good load balancing | |
| Chun et al. | Netbait: a distributed worm detection service | |
| US20150156170A1 (en) | Security Event Routing In a Distributed Hash Table | |
| Zhou et al. | Evaluation of a decentralized architecture for large scale collaborative intrusion detection | |
| Haddadi et al. | DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment | |
| Bou-Harb et al. | A systematic approach for detecting and clustering distributed cyber scanning | |
| Cai et al. | WormShield: Fast worm signature generation with distributed fingerprint aggregation | |
| Ren et al. | Distributed agent-based real time network intrusion forensics system architecture design | |
| Vaarandi | Detecting anomalous network traffic in organizational private networks | |
| Chen et al. | Distributed change-point detection of DDoS attacks over multiple network domains | |
| Choraś et al. | Network events correlation for federated networks protection system |