Scholarworks Repository

Distributed and collaborative intrusion detection systems

Show simple item record

dc.contributor.author Fatroukh A.
dc.contributor.author Mukadam N.
dc.contributor.author Basal E.
dc.contributor.author Elhajj I.H.
dc.contributor.editor
dc.date 2008
dc.date.accessioned 2017-09-07T07:07:20Z
dc.date.available 2017-09-07T07:07:20Z
dc.date.issued 2008
dc.identifier 10.1109/LCW.2008.4545399
dc.identifier.isbn 9.7814244175e+012
dc.identifier.issn
dc.identifier.uri http://hdl.handle.net/10938/11338
dc.description.abstract Intrusion detectiom systems help improve the security of networks by providing early warning and response. To improove the detetion of attacks, sharing data among distributed nodes or terminals and collaborating on. a decision is key. This paper presents a Distributed and Cot laborative In-irtrusion Detection (DaCID) system that relies on Dempster Shafer theory of evidence for fusing data from multiple nodes. In this approach the detection is done collaboratively and the decision is distributed among all nodes. DaCID is more robust than other systems since it is completely distributed and the decision is made autonomously at each node. Simulation results demonstrated. that DaCID's performance approaches that of a centraliied method. © 2008 IEEE.
dc.format.extent
dc.format.extent Pages: (41-45)
dc.language English
dc.publisher NEW YORK
dc.relation.ispartof Publication Name: 2008 IEEE Lebanon Communications Workshop, IEEE LCW 2008; Conference Title: 2008 IEEE Lebanon Communications Workshop, IEEE LCW 2008; Conference Date: 31 May 2008 through 31 May 2008; Conference Location: Beirut; Publication Year: 2008; Pages: (41-45);
dc.relation.ispartofseries
dc.relation.uri
dc.source Scopus
dc.subject.other
dc.title Distributed and collaborative intrusion detection systems
dc.type Conference Paper
dc.contributor.affiliation Fatroukh, A., University of Beirut, Electrical and Computer Engineering Dept., Beirut, Lebanon
dc.contributor.affiliation Mukadam, N., University of Beirut, Electrical and Computer Engineering Dept., Beirut, Lebanon
dc.contributor.affiliation Basal, E., University of Beirut, Electrical and Computer Engineering Dept., Beirut, Lebanon
dc.contributor.affiliation Elhajj, I.H., University of Beirut, Electrical and Computer Engineering Dept., Beirut, Lebanon
dc.contributor.authorAddress Fatroukh, A.; University of Beirut, Electrical and Computer Engineering Dept., Beirut, Lebanon; email: amf06@aub.edu.Ib
dc.contributor.authorCorporate University: American University of Beirut; Faculty: Faculty of Engineering and Architecture; Department: Electrical and Computer Engineering;
dc.contributor.authorDepartment Electrical and Computer Engineering
dc.contributor.authorDivision
dc.contributor.authorEmail
dc.contributor.authorFaculty Faculty of Engineering and Architecture
dc.contributor.authorInitials Farroukh, A
dc.contributor.authorInitials Mukadam, N
dc.contributor.authorInitials Bassil, E
dc.contributor.authorInitials Elhajj, IH
dc.contributor.authorOrcidID
dc.contributor.authorReprintAddress Farroukh, A (reprint author), Amer Univ Beirut, Dept Elect and Comp Engn, Beirut, Lebanon.
dc.contributor.authorResearcherID
dc.contributor.authorUniversity American University of Beirut
dc.description.cited ALLEN M, INDEPENDENT SECURITY; Blanc M., 2003, GLOBAL INTRUSION DET; DERI L, 2003, P TER TNC; DRESSLER F, 2004, 1 IFIP INT WORKSH AU; KANNADIGA P, 2005, P 6 IEEE INT C SOFTW; Madan BB, 2004, PERFORM EVALUATION, V56, P167, DOI 10.1016-j.peva.2003.07.008; Mirkovic J, 2005, IEEE T DEPEND SECURE, V2, P216, DOI 10.1109-TDSC.2005.35; MIRKOVIC J, 2004, 020018 U CAL COMP SC; NAJMI, 2005, TECHIWAREHOUSE 1026; Papadopoulos Christos, 2003, P DARPA INF SURV C E; PORRAS PA, 1998, INT SOC NETW DISTR S; PORRAS PA, 1997, P NAT INF SYST SEC C; RICHARDSON R, 2007, 2007 CSI COMPUTER CR; Siaterlis C., 2005, Journal of Computer Security, V13; SINGH A, 2005, SECURITYFOCUS W 1214; WU YS, 2003, P 19 IEEE ANN COMP S; ZHAI JQ, 2003, P 2 INT C MACH LEARN
dc.description.citedCount 2
dc.description.citedTotWOSCount 1
dc.description.citedWOSCount 1
dc.format.extentCount 5
dc.identifier.articleNo 4545399
dc.identifier.coden
dc.identifier.pubmedID
dc.identifier.scopusID 51249124924
dc.identifier.url
dc.publisher.address 345 E 47TH ST, NEW YORK, NY 10017 USA
dc.relation.ispartofConference Conference Title: 2008 IEEE Lebanon Communications Workshop, IEEE LCW 2008 : Conference Date: 31 May 2008 through 31 May 2008 , Conference Location: Beirut.
dc.relation.ispartofConferenceCode 73389
dc.relation.ispartofConferenceDate 31 May 2008 through 31 May 2008
dc.relation.ispartofConferenceHosting
dc.relation.ispartofConferenceLoc Beirut
dc.relation.ispartofConferenceSponsor IEEE Communications Society Lebanon Chapter;IEEE Lebanon Section
dc.relation.ispartofConferenceTitle 2008 IEEE Lebanon Communications Workshop, IEEE LCW 2008
dc.relation.ispartofFundingAgency
dc.relation.ispartOfISOAbbr
dc.relation.ispartOfIssue
dc.relation.ispartOfPart
dc.relation.ispartofPubTitle 2008 IEEE Lebanon Communications Workshop, IEEE LCW 2008
dc.relation.ispartofPubTitleAbbr IEEE Lebanon Commun. Workshop, IEEE LCW
dc.relation.ispartOfSpecialIssue
dc.relation.ispartOfSuppl
dc.relation.ispartOfVolume
dc.source.ID WOS:000258094700008
dc.type.publication Book
dc.subject.otherAuthKeyword Collaborative
dc.subject.otherAuthKeyword Dempster Shafer
dc.subject.otherAuthKeyword Denial of service
dc.subject.otherAuthKeyword Distributed
dc.subject.otherAuthKeyword Intrusion detection
dc.subject.otherChemCAS
dc.subject.otherIndex Computer crime
dc.subject.otherIndex Computer networks
dc.subject.otherIndex Collaborative
dc.subject.otherIndex Dempster Shafer
dc.subject.otherIndex Denial of service
dc.subject.otherIndex Distributed
dc.subject.otherIndex Lebanon
dc.subject.otherIndex Intrusion detection
dc.subject.otherKeywordPlus
dc.subject.otherWOS Engineering, Electrical and Electronic
dc.subject.otherWOS Telecommunications


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Scholarworks


Browse

My Account