Intrusion detections in collaborative organizations by preserving privacy

3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To overcome the problem of attacks on networks, new Intrusion Detection System (IDS) approaches have been proposed in recent years. They consist in identifying signatures of known attacks to compare them to each request and determine whether it is an attack or not. However, these methods are set to default when the attack is unknown from the database of signatures. Usually this problem is solved by calling human expertise to update the database of signatures. However, it is frequent that an attack has already been detected by another organization and it would be useful to be able to benefit from this knowledge to enrich the database of signatures. Unfortunately this information is not so easy to obtain. In fact organizations do not necessarily want to spread the information that they have already faced this type of attack. In this paper we propose a new approach to intrusion detection in a collaborative environment but by preserving the privacy of the collaborative organizations. Our approach works for any signature that may be written as a regular expression insuring that no information is disclosed on the content of the sites. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Verma, N., Trousset, F., Poncelet, P., & Masseglia, F. (2010). Intrusion detections in collaborative organizations by preserving privacy. In Studies in Computational Intelligence (Vol. 292, pp. 235–247). https://doi.org/10.1007/978-3-642-00580-0_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free