Distributed IDS Tracing Back to Attacking Sources.
Wu LiuHai-Xin DuanJianping WuPing RenLi-Hua LuPublished in: GCC (1) (2003)
Keyphrases
- distributed environment
- intrusion detection system
- data sources
- computing environments
- lightweight
- computer networks
- multi agent
- digital libraries
- distributed data
- anomaly detection
- intrusion detection
- distributed network
- database
- distributed processing
- distributed computing
- peer to peer
- distributed systems
- expert systems
- reinforcement learning
- databases