Advertisement

A Cooperative Approach for Distributed Intrusion Protection in PIS Systems

  • Syed UmarEmail author
  • A. Rajaiah
  • Valasani Usha Shree
  • M. Anudeep
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)

Abstract

In this article, we discuss the protection of the Palestinian national information. We do not limit our defence organization, and think about the whole ecosystem. The developed system is open to the participation of all Palestinian organizations and non-members who are interested in the safety and protection of the existing threats and attacks targeting Palestinian better information. Safety awareness results to collect information from the participating organization.

Keywords

Denial of Service Cyber infrastructure System model 

References

  1. 1.
    Qusa, H., Abudalfa, S.: Secure collaborative processing architecture for MITB attack detection. Int. J. Netw. Secur. Appl. 5, 5 (2013)Google Scholar
  2. 2.
    Baldoni, R., Di Luna, G., Querzoni, L.: Collaborative detection of coordinated port scans. In: ICDCN Proceedings, pp. 102–117 (2013)CrossRefGoogle Scholar
  3. 3.
    Bogdanov, D., Laur, S., Williamsons, J.: Sharemind: a framework for fast privacy-preserving computations. In: Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security, ESORICS 2008, pp. 192–206. Springer, Berlin (2008) CrossRefGoogle Scholar
  4. 4.
    Jerey, D., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)CrossRefGoogle Scholar
  5. 5.
    Roy, I., Setty, S.T.V., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: security and privacy for MapReduce. In: Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI 2010, Berkeley, CA, USA. USENIX Association (2010)Google Scholar
  6. 6.
    Xie, Y., Sekar, V., Reiter, M.K., Zhang, H.: Forensic analysis for epidemic attacks in federated networks. In: ICNP, pp. 143–153 (2006)Google Scholar
  7. 7.
    Zhang, G., Parashar, M.: Cooperative detection and protection against network attacks using decentralized information sharing. Cluster Comput. 13(1), 67–86 (2010)CrossRefGoogle Scholar
  8. 8.
    Salem, M., Buehler, U.: Mining techniques in network security to enhance intrusion detection systems. Int. J. Netw. Secur. Appl. (IJNSA), 4(6) (2012) CrossRefGoogle Scholar
  9. 9.
    Gates, A.F., et al.: Building a high-level dataflow system on top of Map-Reduce: the Pig experience. Proc. VLDB Endow. 2(2), 1414–1425 (2009)CrossRefGoogle Scholar
  10. 10.
    Lipson, H.F.: Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy (2002) Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Syed Umar
    • 1
    Email author
  • A. Rajaiah
    • 2
  • Valasani Usha Shree
    • 2
  • M. Anudeep
    • 1
  1. 1.Department of Computer Science EngineeringJBRECHyderabadIndia
  2. 2.Department of Electronics and Communication EngineeringJBRECHyderabadIndia

Personalised recommendations