DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jeong, SB | ko |
dc.contributor.author | Choi, YW | ko |
dc.contributor.author | Kim, Sehun | ko |
dc.date.accessioned | 2007-11-20T09:32:55Z | - |
dc.date.available | 2007-11-20T09:32:55Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2005 | - |
dc.identifier.citation | LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.204 - 211 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/2069 | - |
dc.description.abstract | Recently, there has been strong interest in distributed schemes for intrusion detection in order to defend against distributed attacks such as DDoS attacks. In this paper, we focus on a placement problem of a detection system across large-scale networks for distributed intrusion detection approaches. We formulate the placement problem as a set packing problem that is NP-hard. We then present an efficient algorithm for minimizing the number of detection systems and finding the optimal placement while limiting the impact of distributed attacks. detection in order to defend against distributed attacks such as DDoS attacks. In this paper, we focus on a placement problem of a detection system across large-scale networks for distributed intrusion detection approaches. We formulate the placement problem as a set packing problem that is NP-hard. We then present an efficient algorithm for minimizing the number of detection systems and finding the optimal placement while limiting the impact of distributed attacks. | - |
dc.description.sponsorship | This work was sponsored in part by the Korean Ministry of Information and Communication in the context of University IT Research Center Project. | en |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | Springer Verlag | - |
dc.title | An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.citation.volume | 3325 | - |
dc.citation.beginningpage | 204 | - |
dc.citation.endingpage | 211 | - |
dc.citation.publicationname | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Sehun | - |
dc.contributor.nonIdAuthor | Jeong, SB | - |
dc.contributor.nonIdAuthor | Choi, YW | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.