Abstract
In this paper, we propose a novel distributed intrusion detection system called AIMS based on overlay multicasting to achieve low control message overhead. Besides, AIMS is dynamically reconfigurable by using domain overlapping cooperation. This paper presents these main techniques that are novel in intrusion detection. Preliminary experimental results on system performance are also reported.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gordon, L.A., et al.: 2004 CSI/FBI Computer Crime and Security Survey (2004), http://www.gocsi.com/
Huang, I.-H., Yang, C.-Z.: Design of an Active Intrusion Monitor System. In: Proc. 37th IEEE ICCST 2003, October 2003, pp. 485–492 (2003)
Huang, I.-H.: Design of an Active Intrusion Monitor System. Master Thesis. Dept. of CSE. Yuan Ze Univ. (June 2004)
Janakiraman, R., Waldvogel, M., Zhang, Q.: Indra: A Peer-to-Peer Approach to Network Intrusion Detection and Prevention. In: Proc. 12th IEEE WET ICE 2003, June 2003, pp. 226–231 (2003)
Jim, T., et al.: Cyclone: A Safe Dialect of C. In: Proc. USENIX 2002 (June 2002)
Porras, P.A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: Proc. 20th NISSC 1997, October 1997, pp. 353–365 (1997)
Snapp, S.R., et al.: A System for Distributed Intrusion Detection. In: Proc. 36th IEEE COMPCON, February 1991, pp. 170–176 (Spring 1991)
Spafford, E.H., Zamboni, D.: Intrusion Detection using Autonomous Agents. Computer Networks 34(4), 547–570 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, IH., Yang, CZ. (2004). A Novel Distributed Intrusion Detection Architecture Based on Overlay Multicasting. In: Liew, KM., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds) Parallel and Distributed Computing: Applications and Technologies. PDCAT 2004. Lecture Notes in Computer Science, vol 3320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30501-9_115
Download citation
DOI: https://doi.org/10.1007/978-3-540-30501-9_115
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24013-6
Online ISBN: 978-3-540-30501-9
eBook Packages: Computer ScienceComputer Science (R0)