IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Network-Based Intrusion Detection

Network-Based Intrusion Detection
View Sample PDF
Author(s): Gábor Hosszú (Budapest University of Technology and Economics, Budapest, Hungary)and Zoltán Czirkos (Budapest University of Technology and Economics, Budapest, Hungary)
Copyright: 2008
Pages: 7
Source title: Encyclopedia of Internet Technologies and Applications
Source Author(s)/Editor(s): Mario Freire (University of Beira Interior, Portugal)and Manuela Pereira (University of Beira Interior, Portugal)
DOI: 10.4018/978-1-59140-993-9.ch050

Purchase

View Network-Based Intrusion Detection on the publisher's website for pricing and purchasing information.

Abstract

As an example of the application for non-conventional purposes a security system is presented in the article that utilizes just the network for protecting the operating system of the computers. The software maintains a database about the experienced intruding attempts. Its entities working on each computer share their experiments among each other on the peer-to-peer (P2P) overlay network created by self organizing on the Internet. In such a way the security of the participants is increased, and then they can take the necessary steps.

Related Content

Ravi Mohan Sharma, Sunita Dwivedi, Vinod Kumar. © 2025. 18 pages.
Nagendra Singh Yadav, Vishal Kumar Goar. © 2025. 40 pages.
Venkat Narayana Rao T., M. Stephen, Rohan Kolachala. © 2025. 28 pages.
Guillermo M. Limon-Molina, E. Ivette Cota-Rivera, Maria E. Raygoza-Limón, Fabian N. Murrieta-Rico, Jesus Heriberto Orduño-Osuna, Roxana Jimenez-Sánchez, Miguel E. Bravo-Zanoguera, Abelardo Mercado. © 2025. 12 pages.
Ravi Kant Kumar, Sobin C. C.. © 2025. 20 pages.
S. Aditi Apurva. © 2025. 18 pages.
Parveen Sadotra, Pradeep Chouksey, Mayank Chopra, Rabia Koser, Rishikesh Rawat. © 2025. 16 pages.
Body Bottom