Por favor, use este identificador para citar o enlazar este ítem:
http://hdl.handle.net/10609/1417
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Garcia-Alfaro, Joaquin | - |
dc.contributor.author | Barrera, Ignasi | - |
dc.contributor.author | Borrell Viader, Joan | - |
dc.contributor.author | Jaeger, Michael A. | - |
dc.contributor.author | Mühl, Gero | - |
dc.contributor.other | Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON) | en |
dc.date.accessioned | 2010-02-16T11:58:25Z | - |
dc.date.available | 2010-02-16T11:58:25Z | - |
dc.date.issued | 2008 | - |
dc.identifier.citation | GARCIA-ALFARO, J.; BARRERA, I.; BORRELL, J.; JAEGER, M.A.; MÜHL, G. (2008). "Distributed Exchange of Alerts for the Detection of Coordinated Attacks". A: Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008). IEEE Computer Society. Halifax. 05 - 08 de Maig. | - |
dc.identifier.isbn | 978-0-7695-3135-9 | - |
dc.identifier.uri | http://hdl.handle.net/10609/1417 | - |
dc.description.abstract | Attacks and intrusionsto informationsystems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to react against the different actions of such an attack. The design and deploymentof a decentralized system targeted at detecting as well as reacting to informationsystem attacks might benefit from the use of the publish/subscribemodel. In this paper, we discussthe advantages and conveniencein usingthis com- munication paradigm for a general decentralized attack preventionframework and overview the designand imple- mentationof our approach by using a combinationof two different publish/subscribemiddleware products. Further- more, wepresentaquantitativeevaluationofourapproach. | en |
dc.language.iso | eng | - |
dc.rights | (c) 2008 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. | - |
dc.subject.lcsh | Computer networks -- Security measures | en |
dc.subject.lcsh | Computer security | en |
dc.title | Distributed exchange of alerts for the detection of coordinated attacks | - |
dc.type | info:eu-repo/semantics/conferenceObject | - |
dc.audience.mediator | Theme areas::Computer Science, Technology and Multimedia | en |
dc.subject.lemac | Ordinadors, Xarxes d' -- Mesures de seguretat | ca |
dc.subject.lemac | Informàtica -- Mesures de seguretat | ca |
dc.subject.lcshes | Ordenadores, Redes de -- Medidas de seguridad | es |
dc.subject.lcshes | Informática -- Medidas de seguridad | es |
dc.identifier.doi | 10.1109/CNSR.2008.70 | - |
Aparece en las colecciones: | Conferències |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
Garcia_08_Distributed.pdf | 615,6 kB | Adobe PDF | Visualizar/Abrir |
Comparte:
Los ítems del Repositorio están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.