{"title":"Distributed Intrusion Detection Systems of Computer Communication Networks","authors":"A. Grzech, M. Kazmierski","doi":"10.1109/NTMS.2008.ECP.39","DOIUrl":null,"url":null,"abstract":"The aim of the contribution is to present an attempt to utilize some data about network topology and performance to increase capabilities of intrusion detection system. Some simple example presents an approach to design topology (location and the needed number of intrusion detection devices) which allows efficiently detecting intrusions and limiting the overall overhead caused by intrusion detection devices performance.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 New Technologies, Mobility and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2008.ECP.39","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The aim of the contribution is to present an attempt to utilize some data about network topology and performance to increase capabilities of intrusion detection system. Some simple example presents an approach to design topology (location and the needed number of intrusion detection devices) which allows efficiently detecting intrusions and limiting the overall overhead caused by intrusion detection devices performance.