DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jeong, SB | ko |
dc.contributor.author | Choi, YW | ko |
dc.contributor.author | Kim, Sehun | ko |
dc.date.accessioned | 2013-03-06T16:34:12Z | - |
dc.date.available | 2013-03-06T16:34:12Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2005 | - |
dc.identifier.citation | INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.204 - 210 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/87609 | - |
dc.description.abstract | Recently, there has been strong interest in distributed schemes for intrusion detection in order to defend against distributed attacks such as DDoS attacks. In this paper, we focus on a placement problem of a detection system across large-scale networks for distributed intrusion detection approaches. We formulate the placement problem as a set packing problem that is NP-hard. We then present an efficient algorithm for minimizing the number of detection systems and finding the optimal placement while limiting the impact of distributed attacks. | - |
dc.language | English | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.title | An effective placement of detection systems for distributed attack detection in large scale networks | - |
dc.type | Article | - |
dc.identifier.wosid | 000227471900017 | - |
dc.identifier.scopusid | 2-s2.0-23944512147 | - |
dc.type.rims | ART | - |
dc.citation.volume | 3325 | - |
dc.citation.beginningpage | 204 | - |
dc.citation.endingpage | 210 | - |
dc.citation.publicationname | INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.contributor.localauthor | Kim, Sehun | - |
dc.contributor.nonIdAuthor | Jeong, SB | - |
dc.contributor.nonIdAuthor | Choi, YW | - |
dc.type.journalArticle | Article; Proceedings Paper | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.