+

Yegneswaran et al., 2003 - Google Patents

Global intrusion detection in the domino overlay system

Yegneswaran et al., 2003

View PDF
Document ID
13045724991943889365
Author
Yegneswaran V
Barford P
Jha S
Publication year

External Links

Snippet

Sharing data between widely distributed intrusion detection systems offers the possibility of significant improvements in speed and accuracy over systems operating in isolation. In this paper, we describe and evaluate DOMINO (Distributed Overlay for Monitoring InterNet …
Continue reading at minds.wisconsin.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19656Network used to communicate with a camera, e.g. WAN, LAN, Internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/10Arrangements for monitoring or testing packet switching networks using active monitoring, e.g. heartbeat protocols, polling, ping, trace-route
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • G06F15/163Interprocessor communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/06Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems

Similar Documents

Publication Publication Date Title
Yegneswaran et al. Global intrusion detection in the domino overlay system
Vasilomanolakis et al. Taxonomy and survey of collaborative intrusion detection
Zhou et al. A survey of coordinated attacks and collaborative intrusion detection
Chen et al. Collaborative detection of DDoS attacks over multiple network domains
Bailey et al. The internet motion sensor-a distributed blackhole monitoring system.
Nagaraja et al. {BotGrep}: Finding {p2p} bots with structured graph analysis
Yao et al. Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter
Hao et al. Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine.
Kandula et al. What's going on? Learning communication rules in edge networks
Hu et al. Accurate real-time identification of IP prefix hijacking
Gupta et al. Defending against distributed denial of service attacks: issues and challenges
Feamster Outsourcing home network security
Katti et al. Collaborating against common enemies
Bhatia et al. Parametric differences between a real-world distributed denial-of-service attack and a flash event
Li et al. Towards scalable and robust distributed intrusion alert fusion with good load balancing
Chun et al. Netbait: a distributed worm detection service
US20150156170A1 (en) Security Event Routing In a Distributed Hash Table
Zhou et al. Evaluation of a decentralized architecture for large scale collaborative intrusion detection
Haddadi et al. DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment
Bou-Harb et al. A systematic approach for detecting and clustering distributed cyber scanning
Cai et al. WormShield: Fast worm signature generation with distributed fingerprint aggregation
Ren et al. Distributed agent-based real time network intrusion forensics system architecture design
Vaarandi Detecting anomalous network traffic in organizational private networks
Chen et al. Distributed change-point detection of DDoS attacks over multiple network domains
Choraś et al. Network events correlation for federated networks protection system
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载