A distributed and privacy-preserving method for network intrusion detection

8Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Organizations security becomes increasingly more difficult to obtain due to the fact that information technology and networking resources are dispersed across organizations. Network intrusion attacks are more and more difficult to detect even if the most sophisticated security tools are used. To address this problem, researchers and vendors have proposed alert correlation, an analysis process that takes the events produced by the monitoring components and produces compact reports on the security status of the organization under monitoring. Centralized solutions imply to gather from distributed resources by a third party the global state of the network in order to evaluate risks of attacks but neglect the honest but curious behaviors. In this paper, we focus on this issue and propose a set of solutions able to give a coarse or a fine grain global state depending on the system needs and on the privacy level requested by the involved organizations. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Benali, F., Bennani, N., Gianini, G., & Cimato, S. (2010). A distributed and privacy-preserving method for network intrusion detection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6427 LNCS, pp. 861–875). https://doi.org/10.1007/978-3-642-16949-6_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free