The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Network-Based Intrusion Detection
|
Author(s): Gábor Hosszú (Budapest University of Technology and Economics, Budapest, Hungary)and Zoltán Czirkos (Budapest University of Technology and Economics, Budapest, Hungary)
Copyright: 2008
Pages: 7
Source title:
Encyclopedia of Internet Technologies and Applications
Source Author(s)/Editor(s): Mario Freire (University of Beira Interior, Portugal)and Manuela Pereira (University of Beira Interior, Portugal)
DOI: 10.4018/978-1-59140-993-9.ch050
Purchase
|
Abstract
As an example of the application for non-conventional purposes a security system is presented in the article that utilizes just the network for protecting the operating system of the computers. The software maintains a database about the experienced intruding attempts. Its entities working on each computer share their experiments among each other on the peer-to-peer (P2P) overlay network created by self organizing on the Internet. In such a way the security of the participants is increased, and then they can take the necessary steps.
Related Content
Ravi Mohan Sharma, Sunita Dwivedi, Vinod Kumar.
© 2025.
18 pages.
|
Nagendra Singh Yadav, Vishal Kumar Goar.
© 2025.
40 pages.
|
Venkat Narayana Rao T., M. Stephen, Rohan Kolachala.
© 2025.
28 pages.
|
Guillermo M. Limon-Molina, E. Ivette Cota-Rivera, Maria E. Raygoza-Limón, Fabian N. Murrieta-Rico, Jesus Heriberto Orduño-Osuna, Roxana Jimenez-Sánchez, Miguel E. Bravo-Zanoguera, Abelardo Mercado.
© 2025.
12 pages.
|
Ravi Kant Kumar, Sobin C. C..
© 2025.
20 pages.
|
S. Aditi Apurva.
© 2025.
18 pages.
|
Parveen Sadotra, Pradeep Chouksey, Mayank Chopra, Rabia Koser, Rishikesh Rawat.
© 2025.
16 pages.
|
|
|