IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Peer-to-Peer Methods for Operating System Security

Peer-to-Peer Methods for Operating System Security
View Sample PDF
Author(s): Zoltan Czirkos (Budapest University of Technology and Economics, Hungary)and Gabor Hosszú (Budapest University of Technology and Economics, Hungary)
Copyright: 2008
Pages: 7
Source title: Encyclopedia of Networked and Virtual Organizations
Source Author(s)/Editor(s): Goran D. Putnik (University of Minho, Portugal)and Maria Manuela Cruz-Cunha (Polytechnic Institute of Cavado and Ave, Portugal)
DOI: 10.4018/978-1-59904-885-7.ch155

Purchase

View Peer-to-Peer Methods for Operating System Security on the publisher's website for pricing and purchasing information.

Abstract

The importance of the network security problems comes into prominence with the growth of the Internet. This article presents a special approach to the intrusion detection (ID) problem, which relies on the collaboration of the protection programs running on different hosts. Computers connected to networks are to be protected by various means (Kemmerer & Vigna, 2002). The collaboration of the elements of the proposed intrusion detection system uses the so-called peer-to-peer (P2P) communication model. The article first presents the usage of the P2P paradigm for improving the protection of the operating systems (Bauer, 2005).

Related Content

Kumar Shalender, Babita Singla. © 2024. 11 pages.
R. Akash, V. Suganya. © 2024. 32 pages.
Prathmesh Singh, Arnav Upadhyaya, Nripendra Singh. © 2024. 14 pages.
Arpan Anand, Priya Jindal. © 2024. 13 pages.
Surjit Singha, K. P. Jaheer Mukthar. © 2024. 26 pages.
M. Vaishali, V. Kiruthiga. © 2024. 14 pages.
Ranjit Singha, Surjit Singha. © 2024. 21 pages.
Body Bottom