Deep packet inspection as a service
Middleboxes play a major role in contemporary networks, as forwarding packets is often not
enough to meet operator demands, and other functionalities (such as security, QoS/QoE …
enough to meet operator demands, and other functionalities (such as security, QoS/QoE …
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are
needed to correlate isolated alerts into attack scenarios. Existing correlation methods …
needed to correlate isolated alerts into attack scenarios. Existing correlation methods …
Operational experiences with high-volume network intrusion detection
H Dreger, A Feldmann, V Paxson… - Proceedings of the 11th …, 2004 - dl.acm.org
In large-scale environments, network intrusion detection systems (NIDSs) face extreme
challenges with respect to traffic volume, traffic diversity, and resource management. While …
challenges with respect to traffic volume, traffic diversity, and resource management. While …
[图书][B] The practical handbook of internet computing
MP Singh - 2004 - taylorfrancis.com
The Practical Handbook of Internet Computing analyzes a broad array of technologies and
concerns related to the Internet, including corporate intranets. Fresh and insightful articles by …
concerns related to the Internet, including corporate intranets. Fresh and insightful articles by …
BlockCSDN: towards blockchain-based collaborative intrusion detection in software defined networking
To safeguard critical services and assets in a distributed environment, collaborative intrusion
detection systems (CIDSs) are usually adopted to share necessary data and information …
detection systems (CIDSs) are usually adopted to share necessary data and information …
Backtracking algorithmic complexity attacks against a NIDS
R Smith, C Estan, S Jha - 2006 22nd Annual Computer Security …, 2006 - ieeexplore.ieee.org
Network Intrusion Detection Systems (NIDS) have become crucial to securing modern
networks. To be effective, a NIDS must be able to counter evasion attempts and operate at or …
networks. To be effective, a NIDS must be able to counter evasion attempts and operate at or …
Towards effective trust-based packet filtering in collaborative network environments
Overhead network packets are a big challenge for intrusion detection systems (IDSs), which
may increase system burden, degrade system performance, and even cause the whole …
may increase system burden, degrade system performance, and even cause the whole …
Automatic generation and analysis of NIDS attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the
NIDS recognizes into another instance that it misses. For example, to avoid matching the …
NIDS recognizes into another instance that it misses. For example, to avoid matching the …
A framework of blockchain-based collaborative intrusion detection in software defined networking
W Li, J Tan, Y Wang - Network and System Security: 14th International …, 2020 - Springer
To protect network assets from various cyber intrusions and fit the distributed environments
like Internet of Things (IoTs), collaborative intrusion detection systems (CIDSs) are widely …
like Internet of Things (IoTs), collaborative intrusion detection systems (CIDSs) are widely …
On the statistical distribution of processing times in network intrusion detection
JBD Cabrera, J Gosar, W Lee… - 2004 43rd IEEE …, 2004 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) are relatively complex devices that monitor information
systems in search for security violations. Characterizing the service times of network IDSs is …
systems in search for security violations. Characterizing the service times of network IDSs is …