The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Network-Based Intrusion Detection
|
Author(s): Gábor Hosszú (Budapest University of Technology and Economics, Budapest, Hungary)and Zoltán Czirkos (Budapest University of Technology and Economics, Budapest, Hungary)
Copyright: 2008
Pages: 7
Source title:
Encyclopedia of Internet Technologies and Applications
Source Author(s)/Editor(s): Mario Freire (University of Beira Interior, Portugal)and Manuela Pereira (University of Beira Interior, Portugal)
DOI: 10.4018/978-1-59140-993-9.ch050
Purchase
|
Abstract
As an example of the application for non-conventional purposes a security system is presented in the article that utilizes just the network for protecting the operating system of the computers. The software maintains a database about the experienced intruding attempts. Its entities working on each computer share their experiments among each other on the peer-to-peer (P2P) overlay network created by self organizing on the Internet. In such a way the security of the participants is increased, and then they can take the necessary steps.
Related Content
Nalini M..
© 2023.
22 pages.
|
Balachandar S., Chinnaiyan R..
© 2023.
19 pages.
|
V. A. Velvizhi, G. Senbagavalli, S. Malini.
© 2023.
29 pages.
|
Amuthan Nallathambi, Kannan Nova.
© 2023.
25 pages.
|
Amuthan Nallathambi, Sivakumar N., Velrajkumar P..
© 2023.
17 pages.
|
Nayana Hegde, Sunilkumar S. Manvi.
© 2023.
18 pages.
|
Udayakumar K., Ramamoorthy S., Poorvadevi R..
© 2023.
26 pages.
|
|
|