IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Network-Based Intrusion Detection

Network-Based Intrusion Detection
View Sample PDF
Author(s): Gábor Hosszú (Budapest University of Technology and Economics, Budapest, Hungary)and Zoltán Czirkos (Budapest University of Technology and Economics, Budapest, Hungary)
Copyright: 2008
Pages: 7
Source title: Encyclopedia of Internet Technologies and Applications
Source Author(s)/Editor(s): Mario Freire (University of Beira Interior, Portugal)and Manuela Pereira (University of Beira Interior, Portugal)
DOI: 10.4018/978-1-59140-993-9.ch050

Purchase

View Network-Based Intrusion Detection on the publisher's website for pricing and purchasing information.

Abstract

As an example of the application for non-conventional purposes a security system is presented in the article that utilizes just the network for protecting the operating system of the computers. The software maintains a database about the experienced intruding attempts. Its entities working on each computer share their experiments among each other on the peer-to-peer (P2P) overlay network created by self organizing on the Internet. In such a way the security of the participants is increased, and then they can take the necessary steps.

Related Content

Nalini M.. © 2023. 22 pages.
Balachandar S., Chinnaiyan R.. © 2023. 19 pages.
V. A. Velvizhi, G. Senbagavalli, S. Malini. © 2023. 29 pages.
Amuthan Nallathambi, Kannan Nova. © 2023. 25 pages.
Amuthan Nallathambi, Sivakumar N., Velrajkumar P.. © 2023. 17 pages.
Nayana Hegde, Sunilkumar S. Manvi. © 2023. 18 pages.
Udayakumar K., Ramamoorthy S., Poorvadevi R.. © 2023. 26 pages.
Body Bottom