Design and modeling of collaboration architecture for security

Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2009) Design and modeling of collaboration architecture for security. In Proceedings of the International Symposium on the Collaborative Technologies and Systems, IEEE Conference Publications, Baltimore, Maryland, pp. 330-341.

View at publisher


Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for heterarchical environments. We propose CIMD (collaborative intrusion and malware detection) as a security overlay framework to enable cooperative intrusion detection approaches. Objectives and associated interests are used to create detection groups for exchange of security-related data. In this work, we contribute a tree-oriented data model for device representation in the scope of security. We introduce an algorithm for the formation of detection groups, show realization strategies for the system and conduct vulnerability analysis. We evaluate the benefit of CIMD by simulation and probabilistic analysis.

Impact and interest:

0 citations in Scopus
Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

ID Code: 58023
Item Type: Conference Paper
Refereed: Yes
Keywords: computer networks;groupware;invasive software;probability;trees (mathematics);collaborative intrusion detection;computer networks;intrusion prevention;malware detection;probabilistic analysis;tree-oriented data model;Algorithm design and analysis;Analytic
DOI: 10.1109/CTS.2009.5067498
Subjects: Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer System Security (080303)
Divisions: Current > Schools > School of Electrical Engineering & Computer Science
Past > Institutes > Information Security Institute
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: Copyright 2009 IEEE Conference Publications
Deposited On: 11 Mar 2013 01:45
Last Modified: 09 Jul 2013 04:06

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page