An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 808
  • Download : 27
DC FieldValueLanguage
dc.contributor.authorJeong, SBko
dc.contributor.authorChoi, YWko
dc.contributor.authorKim, Sehunko
dc.date.accessioned2007-11-20T09:32:55Z-
dc.date.available2007-11-20T09:32:55Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2005-
dc.identifier.citationLECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.204 - 211-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/2069-
dc.description.abstractRecently, there has been strong interest in distributed schemes for intrusion detection in order to defend against distributed attacks such as DDoS attacks. In this paper, we focus on a placement problem of a detection system across large-scale networks for distributed intrusion detection approaches. We formulate the placement problem as a set packing problem that is NP-hard. We then present an efficient algorithm for minimizing the number of detection systems and finding the optimal placement while limiting the impact of distributed attacks. detection in order to defend against distributed attacks such as DDoS attacks. In this paper, we focus on a placement problem of a detection system across large-scale networks for distributed intrusion detection approaches. We formulate the placement problem as a set packing problem that is NP-hard. We then present an efficient algorithm for minimizing the number of detection systems and finding the optimal placement while limiting the impact of distributed attacks.-
dc.description.sponsorshipThis work was sponsored in part by the Korean Ministry of Information and Communication in the context of University IT Research Center Project.en
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherSpringer Verlag-
dc.titleAn Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks-
dc.typeArticle-
dc.type.rimsART-
dc.citation.volume3325-
dc.citation.beginningpage204-
dc.citation.endingpage211-
dc.citation.publicationnameLECTURE NOTES IN COMPUTER SCIENCE-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorKim, Sehun-
dc.contributor.nonIdAuthorJeong, SB-
dc.contributor.nonIdAuthorChoi, YW-
Appears in Collection
IE-Journal Papers(저널논문)
Files in This Item

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0