Reference Hub2
Network-Based Intrusion Detection

Network-Based Intrusion Detection

Gábor Hosszú, Zoltán Czirkos
Copyright: © 2008 |Pages: 7
ISBN13: 9781591409939|ISBN10: 1591409934|EISBN13: 9781591409946
DOI: 10.4018/978-1-59140-993-9.ch050
Cite Chapter Cite Chapter

MLA

Hosszú, Gábor, and Zoltán Czirkos. "Network-Based Intrusion Detection." Encyclopedia of Internet Technologies and Applications, edited by Mario Freire and Manuela Pereira, IGI Global, 2008, pp. 353-359. https://doi.org/10.4018/978-1-59140-993-9.ch050

APA

Hosszú, G. & Czirkos, Z. (2008). Network-Based Intrusion Detection. In M. Freire & M. Pereira (Eds.), Encyclopedia of Internet Technologies and Applications (pp. 353-359). IGI Global. https://doi.org/10.4018/978-1-59140-993-9.ch050

Chicago

Hosszú, Gábor, and Zoltán Czirkos. "Network-Based Intrusion Detection." In Encyclopedia of Internet Technologies and Applications, edited by Mario Freire and Manuela Pereira, 353-359. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59140-993-9.ch050

Export Reference

Mendeley
Favorite

Abstract

As an example of the application for non-conventional purposes a security system is presented in the article that utilizes just the network for protecting the operating system of the computers. The software maintains a database about the experienced intruding attempts. Its entities working on each computer share their experiments among each other on the peer-to-peer (P2P) overlay network created by self organizing on the Internet. In such a way the security of the participants is increased, and then they can take the necessary steps.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.