Deep packet inspection as a service

A Bremler-Barr, Y Harchol, D Hay, Y Koral - Proceedings of the 10th …, 2014 - dl.acm.org
Middleboxes play a major role in contemporary networks, as forwarding packets is often not
enough to meet operator demands, and other functionalities (such as security, QoS/QoE …

Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts

L Wang, A Liu, S Jajodia - Computer communications, 2006 - Elsevier
To defend against multi-step intrusions in high-speed networks, efficient algorithms are
needed to correlate isolated alerts into attack scenarios. Existing correlation methods …

Operational experiences with high-volume network intrusion detection

H Dreger, A Feldmann, V Paxson… - Proceedings of the 11th …, 2004 - dl.acm.org
In large-scale environments, network intrusion detection systems (NIDSs) face extreme
challenges with respect to traffic volume, traffic diversity, and resource management. While …

[图书][B] The practical handbook of internet computing

MP Singh - 2004 - taylorfrancis.com
The Practical Handbook of Internet Computing analyzes a broad array of technologies and
concerns related to the Internet, including corporate intranets. Fresh and insightful articles by …

BlockCSDN: towards blockchain-based collaborative intrusion detection in software defined networking

W Li, Y Wang, W Meng, J Li, C Su - IEICE TRANSACTIONS on …, 2022 - search.ieice.org
To safeguard critical services and assets in a distributed environment, collaborative intrusion
detection systems (CIDSs) are usually adopted to share necessary data and information …

Backtracking algorithmic complexity attacks against a NIDS

R Smith, C Estan, S Jha - 2006 22nd Annual Computer Security …, 2006 - ieeexplore.ieee.org
Network Intrusion Detection Systems (NIDS) have become crucial to securing modern
networks. To be effective, a NIDS must be able to counter evasion attempts and operate at or …

Towards effective trust-based packet filtering in collaborative network environments

W Meng, W Li, LF Kwok - IEEE Transactions on Network and …, 2017 - ieeexplore.ieee.org
Overhead network packets are a big challenge for intrusion detection systems (IDSs), which
may increase system burden, degrade system performance, and even cause the whole …

Automatic generation and analysis of NIDS attacks

S Rubin, S Jha, BP Miller - 20th annual computer security …, 2004 - ieeexplore.ieee.org
A common way to elude a signature-based NIDS is to transform an attack instance that the
NIDS recognizes into another instance that it misses. For example, to avoid matching the …

A framework of blockchain-based collaborative intrusion detection in software defined networking

W Li, J Tan, Y Wang - Network and System Security: 14th International …, 2020 - Springer
To protect network assets from various cyber intrusions and fit the distributed environments
like Internet of Things (IoTs), collaborative intrusion detection systems (CIDSs) are widely …

On the statistical distribution of processing times in network intrusion detection

JBD Cabrera, J Gosar, W Lee… - 2004 43rd IEEE …, 2004 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) are relatively complex devices that monitor information
systems in search for security violations. Characterizing the service times of network IDSs is …