[图书][B] Distributed and cloud computing: from parallel processing to the internet of things

K Hwang, J Dongarra, GC Fox - 2013 - books.google.com
Distributed and Cloud Computing: From Parallel Processing to the Internet of Things offers
complete coverage of modern distributed computing technology including clusters, the grid …

Hybrid intrusion detection with weighted signature generation over anomalous internet episodes

K Hwang, M Cai, Y Chen, M Qin - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
This paper reports the design principles and evaluation results of a new experimental hybrid
intrusion detection system (HIDS). This hybrid system combines the advantages of low false …

WormShield: Fast worm signature generation with distributed fingerprint aggregation

M Cai, K Hwang, J Pan… - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Fast and accurate generation of worm signatures is essential to contain zero-day worms at
the Internet scale. Recent work has shown that signature generation can be automated by …

[PDF][PDF] Intrusion detection system to detect DDoS attack in gnutella hybrid P2P network

M Uddin, R Alsaqour… - Indian Journal …, 2013 - sciresol.s3.us-east-2.amazonaws …
Background/Objectives Distributed Denial of Service (DDoS) attacks are an increasing
threat to the Internet community. Intrusion Detection Systems (IDSs) have become a key …

Semantic routing of search queries in P2P networks

H Rostami, J Habibi, E Livani - Journal of Parallel and Distributed …, 2008 - Elsevier
Peer-to-peer (P2P) networks are beginning to form the infrastructure of future applications.
Heavy network traffic limits the scalability of P2P networks. Indexing is a method to reduce …

[PDF][PDF] Hybrid intrusion detection with weighted signature generation

KJ Sahana Devi, M Bharathi - International Journal of Computer …, 2011 - Citeseer
An intrusion detection system (IDS) inspects all inbound and outbound network activity and
identifies suspicious patterns that may indicate a network or system attack from someone …

Performance enhancement of a Malware Detection System using score based prioritization of snort rules

P Singh, S Behal, K Kumar - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Snort is an open source Intrusion Detection System (IDS) that uses a rule-based approach to
detect different kinds of malware, online attacks, vulnerabilities, etc. The performance of a …

Mitigation of malware proliferation in p2p networks using double-layer dynamic trust (ddt) management scheme

L Cai, R Rojas-Cessa - 2009 IEEE Sarnoff Symposium, 2009 - ieeexplore.ieee.org
Peer-to-peer (P2P) networking is used by users with similar interests to exchange,
contribute, or obtain files. This network model has been proven popular to exchange music …

A framework for large-scale simulation of collaborative intrusion detection systems

D Fisch, A Hofmann, V Hornik… - 2008 IEEE Conference …, 2008 - ieeexplore.ieee.org
Distributed intrusion detection and prevention play an increasingly important role in securing
computer networks. In a distributed intrusion detection system, information about the current …

Empirical analysis of multi-sender segment transmission algorithms in peer-to-peer streaming

G Kowalski, M Hefeeda - 2009 11th IEEE International …, 2009 - ieeexplore.ieee.org
We study and analyze segment transmission scheduling algorithms in swarm-based peer-to-
peer (P2P) streaming systems. These scheduling algorithms are responsible for …