A signal analysis of network traffic anomalies
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Observation and analysis of BGP behavior under stress
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection
IEEE-IWIA '03 Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03)
Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition
Power provisioning for a warehouse-sized computer
Proceedings of the 34th annual international symposium on Computer architecture
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
IEEE Transactions on Dependable and Secure Computing
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
Distributed Intrusion Detection: Simulation and Evaluation of Two Methodologies
SECURWARE '09 Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies
On cellular botnets: measuring the impact of malicious devices on a cellular network core
Proceedings of the 16th ACM conference on Computer and communications security
Energy in ICT: trends and research directions
ANTS'09 Proceedings of the 3rd international conference on Advanced networks and telecommunication systems
Green support for PC-based software router: performance evaluation and modeling
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Access link bandwidth externalities and endogenous internet growth: a long-run economic approach
International Journal of Network Management
IEEE Transactions on Parallel and Distributed Systems
An asynchronous covert channel using spam
Computers & Mathematics with Applications
An artificial immune system architecture for computer securityapplications
IEEE Transactions on Evolutionary Computation
Anomaly detection methods in wired networks: a survey and taxonomy
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Energy-Efficiency and Security Issues in the Cisco Nexus Virtual Distributed Switching
IMIS '12 Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
Secure cooperative access control on grid
Future Generation Computer Systems
Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches
WAINA '13 Proceedings of the 2013 27th International Conference on Advanced Information Networking and Applications Workshops
Hi-index | 0.00 |
Recent studies show that malicious traffic has a significant impact on the behavior of networks, thus early dropping of malicious packets could enhance network performance. Furthermore, recent developments in the field of green networking show that it is possible to modulate power consumption according to the traffic level. Intrusion Detection Systems burden the basic routing task with packets inspection; however, traffic reduction could have beneficial results both on network performance and, with next generation routing devices, in network energy consumption. In this paper, we focus on energy consumption and we present an approach to distribute packet inspection over the network nodes, a model to evaluate the changes in network energy consumption according to early or late discovery and discard of rogue packets, and we adopt our technique and model to evaluate by means of simulation how aggressive distributed intrusion detection could be beneficial in terms of network energy savings.