2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 2009
DOI: 10.1109/idaacs.2009.5343035
|View full text |Cite
|
Sign up to set email alerts
|

Two tiered privacy enhanced intrusion detection system architecture

Abstract: The paper describes an architecture for priYacy enhanced intrusion detection systems, that separates privacy invasiye and privacy-preserving operations. This can be useful in cases "'here less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in house or by law enforcement agencies.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…This article builds upon similar ideas as the two-tier IDS architecture described in [33]. However, this article is extended to support a location-aware mobile scenario that includes partially outsourcing the execution environment to a pay-as-you-go Cloud hosting provider.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This article builds upon similar ideas as the two-tier IDS architecture described in [33]. However, this article is extended to support a location-aware mobile scenario that includes partially outsourcing the execution environment to a pay-as-you-go Cloud hosting provider.…”
Section: Related Workmentioning
confidence: 99%
“…The location aware mobile IDS system architecture is an extension of the two tier architecture in [33]. The architecture has:…”
Section: System Architecturementioning
confidence: 99%