It is important for intrusion detection systems (IDSs) to share information in order to discover attacks involving multiple sites. However, no framework exists for an IDS to request from and send to another IDS data relevant to specific events. The lack of such a framework may result in a waste of p
Cooperating security managers: Distributed intrusion detection systems
β Scribed by Gregory White; Vdo Pooch
- Book ID
- 107915046
- Publisher
- Elsevier Science
- Year
- 1996
- Tongue
- English
- Weight
- 914 KB
- Volume
- 15
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management dec
Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Intrusion detection systems can be