Information sharing for distributed intrusion detection systems.
Tao PengChristopher LeckieKotagiri RamamohanaraoPublished in: J. Netw. Comput. Appl. (2007)
Keyphrases
- information sharing
- intrusion detection system
- computer networks
- intrusion detection
- distributed intrusion detection
- network security
- secure information sharing
- anomaly detection
- network traffic
- network intrusion detection
- resource sharing
- computer security
- data sharing
- computer systems
- cyber security
- government agencies
- share information
- emergency response
- intrusion prevention
- network intrusion detection systems
- homeland security
- distributed systems
- distributed environment
- e government
- attack detection
- sharing information
- cyber attacks
- peer to peer
- real world
- alert correlation
- law enforcement
- data mining techniques
- database systems
- criminal justice
- data processing
- lightweight
- attack scenarios
- databases
- data mining