{"title":"An efficient distributed intrusion detection scheme","authors":"Thomas Holz","doi":"10.1109/CMPSAC.2004.1342666","DOIUrl":null,"url":null,"abstract":"In general, intrusion detection systems are accurate and comfortable instruments for securing computer and network resources. But one of the great unsolved problems of deploying such systems in real-life environments is the low efficiency, especially in the context of applying the host-based attack identification paradigm. In this paper, a new approach for overcoming the efficiency problem is presented: HEIDI (high-efficient intrusion detection infrastructure). By this approach, flexible and efficiency-oriented modules and mechanisms are combined to obtain a distributed intrusion detection scheme.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMPSAC.2004.1342666","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
In general, intrusion detection systems are accurate and comfortable instruments for securing computer and network resources. But one of the great unsolved problems of deploying such systems in real-life environments is the low efficiency, especially in the context of applying the host-based attack identification paradigm. In this paper, a new approach for overcoming the efficiency problem is presented: HEIDI (high-efficient intrusion detection infrastructure). By this approach, flexible and efficiency-oriented modules and mechanisms are combined to obtain a distributed intrusion detection scheme.