In the modern Internet, network anomalies are manifold and range from Distributed Denial of Service (DDoS) attacks over unsolicited communication (e.g. Spam), to large-scale information harvesting. Network operators react by deploying carefully selected monitoring equipment, tuned to protect their individual core assets. Consequently, there exist a multitude of different views on the activities of a particular host at one moment in time, depending on the locally observed activity patterns, the configurations of the monitoring equipment, and the policies and legislations which influence the amount of traffic information that can be analyzed. © 2011 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Cesareo, J., Berger, A., & D’Alconzo, A. (2011). COMINDIS - COllaborative monitoring with MINimum DISclosure (Poster). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6613 LNCS, pp. 189–192). https://doi.org/10.1007/978-3-642-20305-3_19
Mendeley helps you to discover research relevant for your work.