Sciweavers

42 search results - page 7 / 9
» Distributed Exchange of Alerts for the Detection of Coordina...
Sort
View
SECON
2008
IEEE
14 years 1 months ago
On Distributed Optimization Using Peer-to-Peer Communications in Wireless Sensor Networks
—We describe and evaluate a suite of distributed and computationally efficient algorithms for solving a class of convex optimization problems in wireless sensor networks. The pr...
Björn Johansson, Cesare M. Carretti, Mikael J...
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 1 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
ICDCS
2003
IEEE
14 years 23 days ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
INFOCOM
2006
IEEE
14 years 1 months ago
MIND: A Distributed Multi-Dimensional Indexing System for Network Diagnosis
— Detecting coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have two logically distinct elements: ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 1 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...