Intrusion Detection System for Protection against Packet Dropping Attack on Distributed Information System in any Organization
“Intrusion detection system” Wikipedia - The Free Encyclopedia, Online: http://en.wikipedia.org/wiki/Intrusion_detection_system (2011)
Bace and Rebecca, “An Introduction to Intrusion Detection and Assessment: System and Network Security Management”. ICSA White paper, Vol 2, No. 9 (1998)
Zaman S, Karray F, “Lightweight IDS Based on Features Selection and IDS Classification Scheme”, Proc. International Conference Computational Science and Engineering CSE '09, Vol 3, pp. 365-369 (2009)
Roschke S, Feng Cheng, Meinel C, “An Extensible and Virtualization-Compatible IDS Management Architecture” Proc. 5th International Conference on Information Assurance and Security, Vol. 2, pp. 130-134 (2009)
Silva M, Lopes D, Abdelouahab Z, “A Remote IDS Based on Multi-Agent Systems, Web Services and MDA” Proc International Conference Software Engineering Advances, pp. 64-67 (2006)
Naveed M, Nihar S, Inayatullah Babar, “Network intrusion prevention by configuring ACLs on the routers, based on snort IDS alerts” Proc 6th International Conference Emerging Technologies (ICET), pp. 234 – 239 (2010).
Rao U.P, Sahani G.J., Patel D.R, “Machine learning proposed approach for detecting database intrusions in RBAC enabled databases” Proc. International Conference Computing Communication and Networking Technologies (ICCCNT), pp. 1-4, (2010)
Weijian Huang, Yan An, Wei Du, “A Multi-Agent-Based Distributed Intrusion Detection System” Proc. International Conference Advanced Computer Theory and Engineering (ICACTE), Vol. 3 pp. 141-143 (2010)
Xiaohong Qu, Zhijie Liu, Xiaoyao Xie, “Research on distributed intrusion detection system based on Protocol analysis” Proc. 3rd International Conference Anti-counterfeiting, Security, and Identification in Communication, pp. 421-424 (2009)
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.