Reference Hub1
Peer-to-Peer Methods for Operating System Security

Peer-to-Peer Methods for Operating System Security

Zoltan Czirkos, Gabor Hosszú
Copyright: © 2008 |Pages: 7
ISBN13: 9781599048857|ISBN10: 159904885X|EISBN13: 9781599048864
DOI: 10.4018/978-1-59904-885-7.ch155
Cite Chapter Cite Chapter

MLA

Czirkos, Zoltan, and Gabor Hosszú. "Peer-to-Peer Methods for Operating System Security." Encyclopedia of Networked and Virtual Organizations, edited by Goran D. Putnik and Maria Manuela Cruz-Cunha, IGI Global, 2008, pp. 1185-1191. https://doi.org/10.4018/978-1-59904-885-7.ch155

APA

Czirkos, Z. & Hosszú, G. (2008). Peer-to-Peer Methods for Operating System Security. In G. Putnik & M. Cruz-Cunha (Eds.), Encyclopedia of Networked and Virtual Organizations (pp. 1185-1191). IGI Global. https://doi.org/10.4018/978-1-59904-885-7.ch155

Chicago

Czirkos, Zoltan, and Gabor Hosszú. "Peer-to-Peer Methods for Operating System Security." In Encyclopedia of Networked and Virtual Organizations, edited by Goran D. Putnik and Maria Manuela Cruz-Cunha, 1185-1191. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-885-7.ch155

Export Reference

Mendeley
Favorite

Abstract

The importance of the network security problems comes into prominence with the growth of the Internet. This article presents a special approach to the intrusion detection (ID) problem, which relies on the collaboration of the protection programs running on different hosts. Computers connected to networks are to be protected by various means (Kemmerer & Vigna, 2002). The collaboration of the elements of the proposed intrusion detection system uses the so-called peer-to-peer (P2P) communication model. The article first presents the usage of the P2P paradigm for improving the protection of the operating systems (Bauer, 2005).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.