Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Business
Working For Excellence In The E-Conomy: 2nd International We-B Conference, Sue Stoney (Ed.)
Working For Excellence In The E-Conomy: 2nd International We-B Conference, Sue Stoney (Ed.)
Research outputs pre 2011
Welcome to Perth, Western Australia, and to the 2nd International We-B Conference 2001 "working for excellence in the e-conomy" hosted by the We-B Centre, School of Management Information Systems at Edith Cowan University.
This is an international conference for academics and industry specialists in e-business, e-government and related fields. The conference has drawn participants from national and international organisations.
All submitted papers were subjected to an anonymous peer review process managed by the Conference Committee.
Nidh - Network Intrusion Detection Hierarchy: A Model For Gathering Attack Intelligence, Craig Valli
Nidh - Network Intrusion Detection Hierarchy: A Model For Gathering Attack Intelligence, Craig Valli
Research outputs pre 2011
Internet proxy systems such as Squid exchange intelligence relevant to their function as caching proxy servers via a distributed and trusted hierarchy of machines. The required intelligence is broadcast based along the network based upon established trust relationships throughout the connected network via specific port and protocols of exchange. An intrusion detection system that incorporates this functionality for gathering attack intelligence could be a formidable foe even for the wiliest attacker. This paper will outline a possible model for the deployment of a network/distributed network intrusion detection system utilising technologies and techniques already in existence to provide the supporting infrastructure.