Online ISSN:1349-8606
Progress in Informatics  
No5. March 2008  
Page 65-74  
 
CAMNEP: An intrusion detection system for high-speed networks
Martin REHÁK, Michal PECHOUCEK, Karel BARTOS, Martin GRILL, Pavel CELEDA, and Vojtech KRMÍCEK

LINK [1] S. Axelsson, “The base-rate fallacy and the difficulty of intrusion detection,” ACM Trans. Inf. Syst. Secur.,vol. 3, no. 3, pp.186-205, 2000.

LINK [2] S. Axelsson, “Intrusion detection systems: A survey and taxonomy,” Technical Report 99-15, Chalmers Univ., March 2000.

LINK [3] CESNET, z. s. p. o. Family of COMBO Cards. http://www.liberouter.org/hardware.php, 2007.

LINK [4] Cisco Systems. Cisco IOS NetFlow. http://www.cisco.com/go/netflow, 2007.

LINK [5] Evan Cooke, Farnam Jahanian, and Danny Mcpherson, “The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets.” Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), pp.39-44, June 2005.

LINK [6] L. Ertoz, E. Eilertson, A. Lazarevic, P.-N. Tan, V. Kumar, J. Srivastava, and P. Dokas, “MINDS-Minnesota Intrusion Detection System.” Next Generation Data Mining, MIT Press, 2004.

LINK [7] A. Lakhina, M. Crovella, and C. Diot, “Characterization of Network-Wide Anomalies in Traffic Flows.” ACM SIGCOMM conference on Internet measurement IMC'04, pp.201-206, New York, NY, USA, ACM Press, 2004.

LINK [8]A.Lakhina, M. Crovella, and C. Diot, “Diagnosis Network-Wide Traffic Anomalies.” ACM SIGCOMM'04, pp.219-230, New York, NY, USA, ACM Press, 2004.

LINK [9] A. Lakhina, M. Crovella, and C. Diot, “Mining Anomalies using Traffic Feature Distributions.” ACM SIGCOMM, Philadelphia, PA, August 2005, pp.217-228, NewYork, NY, USA, ACM Press, 2005.

LINK [10] M. Lesk, “The new front line: Estonia under cyberassault.” IEEE Security and Privacy, vol.5, no. 4, pp.76-79, 2007.

LINK [11] Gordon Lyon, Nmap. http://insecure.org/nmap/.

LINK [12] S. Marsh, Formalising trust as a computational concept, 1994.

LINK [13] S. Northcutt and J. Novak, Network Intrusion Detection: An Analyst's Handbook. Thousand Oaks, CA, USA, NewRiders Publishing, 2002.

LINK [14] M. Rehak, M. Pechoucek, K. Bartos, M. Grill, and P. Celeda, “Network intrusion detection by means of community of trusting agents.” IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2007 Main Conference Proceedings) (IAT'07), Los Alamitos, CA, USA, 2007. IEEE Computer Society.

LINK [15] M. Rehák, L. Foltýn, M. Pechoucek, and P. Benda. “Trust Model for Open Ubiquitous Agent Systems.” Intelligent Agent Technology, 2005 IEEE/WIC/ACM International Conference, number PR2416 in IEEE, 2005.

LINK [16] M. Rehak and M. Pechoucek. “Trust modeling with contextrepresentation and generalized identities.” Cooperative Information Agents XI, number 4676 in LNAI/LNCS. Springer-Verlag, 2007.

LINK [17] K. Scarfone and P. Mell, “Guide to intrusion detection and prevention systems (idps).” Technical Report 800-94,NIST, US Dept. of Commerce, 2007.

LINK [18] S. Sidiroglou and A. D. Keromytis. “Countering network wormsthrough automatic patch generation.” IEEE Security & Privacy, vol. 3, no. 6, pp.41-49, November/December 2005.

LINK [19] D. Šišlák, M. Rehák, M. Pechoucek, M. Rollo, and D. Pavlícek, “A-globe: Agent development platform with inaccessibility and mobility support.” Software Agent-Based Applications, Platforms and Development Kits, pp.21-46, Berlin, Birkhauser Verlag, 2005.

LINK [20] Sourcefire, Inc. SNORT—Intrusion Prevention System. http://www.snort.org/,2007.

LINK [21] J. Tozicka, M. Rovatsos, and M. Pechoucek, “A framework for agent-based distributed machine learning and data mining.” Autonomous Agents and Multi-Agent Systems (AAMAS 2007), pp.666-673, New York, NY, ACM Press, 2007.

LINK [22] K. Xu, Z.-L. Zhang, and S. Bhattacharrya, “Reducing Unwanted Traffic in a Backbone Network.” USENIX Workshop on Steps to Reduce Unwanted Traffic in the Internet (SRUTI), Boston, MA, July 2005.