Abstraction-based intrusion detection in distributed environments
ACM Transactions on Information and System Security (TISSEC)
Adaptive Management of an Active Service Network
BT Technology Journal
DEVS Simulation of distributed intrusion detection systems
Transactions of the Society for Computer Simulation International - Recent advances in DEVS Methodology--part I
Hierarchical Simulation Model with Animation for Large Network Security
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Decentralized Event Correlation for Intrusion Detection
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Agent-Based Model of Computer Network Security System: A Case Study
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
BASIS: A Biological Approach to System Information Security
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Protocol scrubbing: network security through transparent flow modification
IEEE/ACM Transactions on Networking (TON)
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Autonomous Agents and Multi-Agent Systems
Automated adaptive intrusion containment in systems of interacting services
Computer Networks: The International Journal of Computer and Telecommunications Networking
A System Architecture for Computer Intrusion Detection
Information-Knowledge-Systems Management
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Collaborating against common enemies
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
IEEE Transactions on Dependable and Secure Computing
Improving network security using genetic algorithm approach
Computers and Electrical Engineering
A taxonomy of intrusion response systems
International Journal of Information and Computer Security
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
A modular architecture for distributed IDS in MANET
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartIII
Cost-sensitive intrusion responses for mobile ad hoc networks
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Secure multi-agent coordination in a network monitoring system
Software engineering for large-scale multi-agent systems
Homogeneity as an advantage: it takes a community to protect an application
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
BotGrep: finding P2P bots with structured graph analysis
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Agent-based distributed intrusion alert system
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
A distributed intrusion detection approach for secure software architecture
EWSA'05 Proceedings of the 2nd European conference on Software Architecture
A composite key management scheme for mobile ad hoc networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Modeling requests among cooperating intrusion detection systems
Computer Communications
Intrusion detection with mobile agents
Computer Communications
Definition of response metrics for an ontology-based Automated Intrusion Response Systems
Computers and Electrical Engineering
Mobile Agent Based Network Defense System in Enterprise Network
International Journal of Handheld Computing Research
A survey of intrusion detection techniques for cyber-physical systems
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
The need for increased security measures in computer systems and networks is apparent through the frequent media accounts of computer system and network intrusions. One attempt at increasing security measures is in the area of intrusion detection packages. These packages use a variety of means to detect intrusive activities and have been applied to both individual computer systems and networks. Cooperating security managers (CSM) is one such package. Applied to a network, CSM is designed to perform intrusion detection and reporting functions in a distributed environment without requiring a designated central site or server to perform the analysis of network audit data. In addition, it is designed to handle intrusions as opposed to simply detecting and reporting on them, resulting in a comprehensive approach to individual system and network intrusions. Tests of the initial prototype have shown the cooperative methodology to perform favourably