A survey of peer-to-peer content distribution technologies, ACM Computing Surveys, vol.36, issue.4, pp.335-371, 2004. ,
DOI : 10.1145/1041680.1041681
LAMBDA: A language to model a database for detection of attacks. In: Recent advances in intrusion detection, pp.197-216, 2000. ,
Peer-to-peer Based Intrusion Detection, Infocommunications Journal LXIV(I), pp.3-10, 2009. ,
Novel Applications of the Peerto-Peer Communication Methodology, Journal on Information Technologies and Communications E, vol.1, issue.15, pp.59-70, 2009. ,
Aggregation and Correlation of Intrusion-Detection Alerts, Lecture Notes in Computer Science, vol.2212, pp.85-103, 2001. ,
DOI : 10.1007/3-540-45474-8_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.6291
Rule-Based Anomaly Detection on IP Flows, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.424-432, 2009. ,
DOI : 10.1109/INFCOM.2009.5061947
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.1613
Indra: a peer-to-peer approach to network intrusion detection and prevention, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003., pp.226-231, 2003. ,
DOI : 10.1109/ENABL.2003.1231412
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.5242
Consistent hashing and random trees, Proceedings of the twenty-ninth annual ACM symposium on Theory of computing , STOC '97, pp.654-663, 1997. ,
DOI : 10.1145/258533.258660
Nstat: A model-based real-time network intrusion detection system, 1997. ,
Intrusion detection: a brief history and overview, Computer, vol.35, issue.4, pp.27-30, 2002. ,
DOI : 10.1109/MC.2002.1012428
A statistical theory of chord under churn. Peer-to-Peer Systems IV pp, pp.93-103, 2005. ,
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, 2002. ,
DOI : 10.1007/3-540-45748-8_5
Inside the slammer worm, IEEE Security & Privacy Magazine, vol.1, issue.4, pp.33-39, 2003. ,
DOI : 10.1109/MSECP.2003.1219056
Chord, ACM SIGCOMM Computer Communication Review, vol.31, issue.4, pp.149-160, 2001. ,
DOI : 10.1145/964723.383071
A requires/provides model for computer attacks, Proceedings of the 2000 workshop on New security paradigms , NSPW '00, pp.31-38, 2001. ,
DOI : 10.1145/366173.366187
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4374
Probabilistic Alert Correlation, Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection pp, pp.54-68, 2001. ,
DOI : 10.1007/3-540-45474-8_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.3371
A PRoactive malware identification system based on the computer hygiene principles, Information Management & Computer Security, vol.15, issue.4, pp.295-312, 2007. ,
DOI : 10.1145/948109.948136
Global intrusion detection in the domino overlay system, Proceedings of NDSS, 2004. ,
A Peer-to-Peer Collaborative Intrusion Detection System, In: Networks, 2005. 13th IEEE International Conference on, p.6, 2006. ,
A survey of coordinated attacks and collaborative intrusion detection, Computers & Security, vol.29, issue.1, pp.124-140, 2010. ,
DOI : 10.1016/j.cose.2009.06.008