Design and modeling of collaboration architecture for security
Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2009) Design and modeling of collaboration architecture for security. In Proceedings of the International Symposium on the Collaborative Technologies and Systems, IEEE Conference Publications, Baltimore, Maryland, pp. 330-341.
Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for heterarchical environments. We propose CIMD (collaborative intrusion and malware detection) as a security overlay framework to enable cooperative intrusion detection approaches. Objectives and associated interests are used to create detection groups for exchange of security-related data. In this work, we contribute a tree-oriented data model for device representation in the scope of security. We introduce an algorithm for the formation of detection groups, show realization strategies for the system and conduct vulnerability analysis. We evaluate the benefit of CIMD by simulation and probabilistic analysis.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Conference Paper|
|Keywords:||computer networks;groupware;invasive software;probability;trees (mathematics);collaborative intrusion detection;computer networks;intrusion prevention;malware detection;probabilistic analysis;tree-oriented data model;Algorithm design and analysis;Analytic|
|Subjects:||Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer System Security (080303)|
|Divisions:||Current > Schools > School of Electrical Engineering & Computer Science
Past > Institutes > Information Security Institute
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Copyright Owner:||Copyright 2009 IEEE Conference Publications|
|Deposited On:||11 Mar 2013 01:45|
|Last Modified:||09 Jul 2013 04:06|
Repository Staff Only: item control page