Skip to main content

A Novel Distributed Intrusion Detection Architecture Based on Overlay Multicasting

  • Conference paper
Parallel and Distributed Computing: Applications and Technologies (PDCAT 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3320))

  • 993 Accesses

Abstract

In this paper, we propose a novel distributed intrusion detection system called AIMS based on overlay multicasting to achieve low control message overhead. Besides, AIMS is dynamically reconfigurable by using domain overlapping cooperation. This paper presents these main techniques that are novel in intrusion detection. Preliminary experimental results on system performance are also reported.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gordon, L.A., et al.: 2004 CSI/FBI Computer Crime and Security Survey (2004), http://www.gocsi.com/

  2. Huang, I.-H., Yang, C.-Z.: Design of an Active Intrusion Monitor System. In: Proc. 37th IEEE ICCST 2003, October 2003, pp. 485–492 (2003)

    Google Scholar 

  3. Huang, I.-H.: Design of an Active Intrusion Monitor System. Master Thesis. Dept. of CSE. Yuan Ze Univ. (June 2004)

    Google Scholar 

  4. Janakiraman, R., Waldvogel, M., Zhang, Q.: Indra: A Peer-to-Peer Approach to Network Intrusion Detection and Prevention. In: Proc. 12th IEEE WET ICE 2003, June 2003, pp. 226–231 (2003)

    Google Scholar 

  5. Jim, T., et al.: Cyclone: A Safe Dialect of C. In: Proc. USENIX 2002 (June 2002)

    Google Scholar 

  6. Porras, P.A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: Proc. 20th NISSC 1997, October 1997, pp. 353–365 (1997)

    Google Scholar 

  7. Snapp, S.R., et al.: A System for Distributed Intrusion Detection. In: Proc. 36th IEEE COMPCON, February 1991, pp. 170–176 (Spring 1991)

    Google Scholar 

  8. Spafford, E.H., Zamboni, D.: Intrusion Detection using Autonomous Agents. Computer Networks 34(4), 547–570 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, IH., Yang, CZ. (2004). A Novel Distributed Intrusion Detection Architecture Based on Overlay Multicasting. In: Liew, KM., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds) Parallel and Distributed Computing: Applications and Technologies. PDCAT 2004. Lecture Notes in Computer Science, vol 3320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30501-9_115

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30501-9_115

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24013-6

  • Online ISBN: 978-3-540-30501-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics