{"title":"用于入侵检测系统的分布式传感器对象","authors":"R. Erbacher, Steve E. Hutchinson","doi":"10.1109/ITNG.2012.100","DOIUrl":null,"url":null,"abstract":"Effective intrusion detection requires the analysis of enormous volumes of data collected from distributed sensor objects. Traditionally, this analysis has been performed on central servers. The alternative has been to limit data collection to network flow data, with the side effect of reducing intrusion detection effectiveness. This research examined an alternative, namely the incorporation of more intelligent sensor objects. We discuss the infrastructure required to support such a metaphor, the potential tradeoffs, and a novel algorithm for such an intelligent distributed sensor object.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Distributed Sensor Objects for Intrusion Detection Systems\",\"authors\":\"R. Erbacher, Steve E. Hutchinson\",\"doi\":\"10.1109/ITNG.2012.100\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Effective intrusion detection requires the analysis of enormous volumes of data collected from distributed sensor objects. Traditionally, this analysis has been performed on central servers. The alternative has been to limit data collection to network flow data, with the side effect of reducing intrusion detection effectiveness. This research examined an alternative, namely the incorporation of more intelligent sensor objects. We discuss the infrastructure required to support such a metaphor, the potential tradeoffs, and a novel algorithm for such an intelligent distributed sensor object.\",\"PeriodicalId\":117236,\"journal\":{\"name\":\"2012 Ninth International Conference on Information Technology - New Generations\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-04-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Ninth International Conference on Information Technology - New Generations\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNG.2012.100\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Ninth International Conference on Information Technology - New Generations","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNG.2012.100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Distributed Sensor Objects for Intrusion Detection Systems
Effective intrusion detection requires the analysis of enormous volumes of data collected from distributed sensor objects. Traditionally, this analysis has been performed on central servers. The alternative has been to limit data collection to network flow data, with the side effect of reducing intrusion detection effectiveness. This research examined an alternative, namely the incorporation of more intelligent sensor objects. We discuss the infrastructure required to support such a metaphor, the potential tradeoffs, and a novel algorithm for such an intelligent distributed sensor object.